Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-1389 (GCVE-0-2009-1389)
Vulnerability from cvelistv5 – Published: 2009-06-16 23:00 – Updated: 2024-08-07 05:13- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T05:13:25.541Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "35265",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35265"
},
{
"name": "DSA-1865",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2009/dsa-1865"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wiki.rpath.com/Advisories:rPSA-2009-0111"
},
{
"name": "37298",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37298"
},
{
"name": "36131",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36131"
},
{
"name": "[oss-security] 20090610 CVE-2009-1389 kernel: r8169: fix crash when large packets are received",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2009/06/10/1"
},
{
"name": "FEDORA-2009-6883",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html"
},
{
"name": "SUSE-SA:2010:031",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html"
},
{
"name": "FEDORA-2009-6768",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html"
},
{
"name": "37471",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37471"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.citrix.com/article/CTX123453"
},
{
"name": "linux-kernel-rtl8169nic-dos(51051)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51051"
},
{
"name": "MDVSA-2009:148",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148"
},
{
"name": "[linux-netdev] 20090214 r8169: instant crash if receiving packet larger than MTU",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=linux-netdev\u0026m=123462461713724\u0026w=2"
},
{
"name": "DSA-1844",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2009/dsa-1844"
},
{
"name": "USN-807-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-807-1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "RHSA-2009:1193",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1193.html"
},
{
"name": "35566",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35566"
},
{
"name": "1023507",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1023507"
},
{
"name": "RHSA-2009:1157",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1157.html"
},
{
"name": "20090724 rPSA-2009-0111-1 kernel",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/505254/100/0/threaded"
},
{
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "36051",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36051"
},
{
"name": "36327",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36327"
},
{
"name": "40645",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/40645"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.avaya.com/css/P8/documents/100067254"
},
{
"name": "36045",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36045"
},
{
"name": "ADV-2010-0219",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/0219"
},
{
"name": "oval:org.mitre.oval:def:10415",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10415"
},
{
"name": "35281",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/35281"
},
{
"name": "oval:org.mitre.oval:def:8108",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8108"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"name": "[linux-kernel] 20090608 [Security, resend] Instant crash with rtl8169 and large packets",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lkml.org/lkml/2009/6/8/194"
},
{
"name": "FEDORA-2009-6846",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html"
},
{
"name": "SUSE-SA:2009:038",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html"
},
{
"name": "ADV-2009-3316",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=fdd7b4c3302c93f6833e338903ea77245eb510b4"
},
{
"name": "35847",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35847"
},
{
"name": "ADV-2010-1857",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/1857"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-06-10T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-10T18:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "35265",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35265"
},
{
"name": "DSA-1865",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2009/dsa-1865"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wiki.rpath.com/Advisories:rPSA-2009-0111"
},
{
"name": "37298",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37298"
},
{
"name": "36131",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36131"
},
{
"name": "[oss-security] 20090610 CVE-2009-1389 kernel: r8169: fix crash when large packets are received",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2009/06/10/1"
},
{
"name": "FEDORA-2009-6883",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html"
},
{
"name": "SUSE-SA:2010:031",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html"
},
{
"name": "FEDORA-2009-6768",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html"
},
{
"name": "37471",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37471"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.citrix.com/article/CTX123453"
},
{
"name": "linux-kernel-rtl8169nic-dos(51051)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51051"
},
{
"name": "MDVSA-2009:148",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148"
},
{
"name": "[linux-netdev] 20090214 r8169: instant crash if receiving packet larger than MTU",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=linux-netdev\u0026m=123462461713724\u0026w=2"
},
{
"name": "DSA-1844",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2009/dsa-1844"
},
{
"name": "USN-807-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-807-1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "RHSA-2009:1193",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1193.html"
},
{
"name": "35566",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35566"
},
{
"name": "1023507",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1023507"
},
{
"name": "RHSA-2009:1157",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1157.html"
},
{
"name": "20090724 rPSA-2009-0111-1 kernel",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/505254/100/0/threaded"
},
{
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "36051",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36051"
},
{
"name": "36327",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36327"
},
{
"name": "40645",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/40645"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.avaya.com/css/P8/documents/100067254"
},
{
"name": "36045",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36045"
},
{
"name": "ADV-2010-0219",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/0219"
},
{
"name": "oval:org.mitre.oval:def:10415",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10415"
},
{
"name": "35281",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/35281"
},
{
"name": "oval:org.mitre.oval:def:8108",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8108"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"name": "[linux-kernel] 20090608 [Security, resend] Instant crash with rtl8169 and large packets",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lkml.org/lkml/2009/6/8/194"
},
{
"name": "FEDORA-2009-6846",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html"
},
{
"name": "SUSE-SA:2009:038",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html"
},
{
"name": "ADV-2009-3316",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=fdd7b4c3302c93f6833e338903ea77245eb510b4"
},
{
"name": "35847",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35847"
},
{
"name": "ADV-2010-1857",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/1857"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2009-1389",
"datePublished": "2009-06-16T23:00:00.000Z",
"dateReserved": "2009-04-23T00:00:00.000Z",
"dateUpdated": "2024-08-07T05:13:25.541Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2009-1389",
"date": "2026-05-14",
"epss": "0.07833",
"percentile": "0.92059"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:linux:kernel:2.6.24.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1760FDC9-BB79-4299-8A6D-482085EE5BD7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:linux:kernel:2.6.25.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56EEB157-5037-4EAD-8625-35B91B167111\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AAEC8651-9291-4CAE-AA49-C1CA4C7AE450\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FC560CC-F785-42D5-A25B-1BA02E7AC464\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"142BCD48-8387-4D0C-A052-44DD4144CBFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:*:64-bit_x86:*:*:*:*:*\", \"matchCriteriaId\": \"A12077FF-39D0-474A-AB6C-62926CC065B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:*:itanium_ia64_montecito:*:*:*:*:*\", \"matchCriteriaId\": \"508BC14E-41D8-4847-AE0F-7830E2EE0522\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BCA84E2-AC4A-430D-8A30-E660D2A232A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*\", \"matchCriteriaId\": \"2255842B-34CD-4062-886C-37161A065703\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0ED322D-004C-472E-A37F-89B78C55FE5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*\", \"matchCriteriaId\": \"412F7334-C46B-4F61-B38A-2CA56B498151\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*\", \"matchCriteriaId\": \"5967AF83-798D-4B1E-882A-5737FFC859C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*\", \"matchCriteriaId\": \"A90D2123-D55B-4104-8D82-5B6365AA3B77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCCDFD49-D402-420E-92F5-20445A0FE139\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A073700-E8A9-4F76-9265-2BE0D5AC9909\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*\", \"matchCriteriaId\": \"8877D178-1655-46E9-8F5A-2DD576601F38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D55059C-B867-4E0F-B29C-9CD2C86915A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*\", \"matchCriteriaId\": \"8358E965-3689-4B05-8470-C4A1463FA0E9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8220D81-9065-471F-9256-CFE7B9941555\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2A55C17-C530-4898-BC95-DE4D495F0D7C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C14A949-E2B8-4100-8ED4-645CB996B08A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"81941077-0011-4272-A8C7-21D0AFE7DECB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB445E3E-CCBD-4737-BE30-841B9A79D558\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B2EDDD7-5B3E-45AA-BC42-A6FF516B8F57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"02F89C7A-24F2-4518-A605-78A5B7056A1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C43BA02-0686-42F0-B901-4CB88459E2D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.2.27.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"241FF5F5-516B-4F77-ABAF-787DFEFEC1AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5301E27-8021-467C-A9A2-AF2137EF0299\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"59393187-1D1E-45CD-BE0E-385F978E4834\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0CCDF6B-0365-4553-B161-3F6D68A58F72\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9B2BB71-0489-40F6-9CB6-A95B96E92106\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"842ECCE2-60F0-41C0-9EAA-A43AF97F61AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79787868-2D77-4B55-AD61-C2B357CCE047\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"05F0391C-D4CC-4652-A24C-DC47F4C3DC91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"56340FF9-EE77-4EB3-9720-240FAAEF39F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"79EB0E94-6AE8-4703-96BD-B927E0F2893F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B3F27D3-8F1D-4576-A584-1E2059CC67B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A1F1242-0F07-4D81-9175-3BA5B2C7B564\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"3ECBCF2E-95B3-4BE9-9B93-6390AB578C7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CF4EC75-06A2-4BD4-A39A-183F00C46E11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB5D260C-AE1C-47E9-A88C-B9C2B4349249\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0934C49-5F88-4189-BD88-2F32C39C2F25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFC3618C-FBE8-4F7C-BECE-F2CDDF785599\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6501752-2595-4412-9140-C78EB9FD41CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA9958C6-AB7D-4B67-9AA7-42B628CBC391\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"14B0A230-4054-4483-A3A7-9A5A286C7552\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D78F881-DB3A-423A-8DAD-314645B2B3EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"D77D4CC4-7008-4E6F-A8CA-62DA244BB3AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C16E3D04-EC66-41FD-9CFA-FE0C21952CAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"F90242EF-048B-4539-AA41-87AA84875A9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C4E9325-2A70-4E15-9AAF-5588BF218055\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"01402A85-B681-4DE0-B7BB-F52567DA29E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"70D1E088-5A9B-4CBF-A4FF-969201942CCC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"455E647F-73DD-400A-AA19-3D93FE2E57AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABEBD63E-6194-4CB4-A1CE-E4FBB6F0A6E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:386:*:*:*:*:*\", \"matchCriteriaId\": \"27B3F220-7FE0-4D47-918B-C9CBFAD23808\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686:*:*:*:*:*\", \"matchCriteriaId\": \"813C1C54-697D-4170-8202-E07FF578815A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686_smp:*:*:*:*:*\", \"matchCriteriaId\": \"51403992-077A-4F6F-8722-DAAD30489DB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64:*:*:*:*:*\", \"matchCriteriaId\": \"BD22CEB2-838D-4D03-B1D0-2735CA5CA7EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8:*:*:*:*:*\", \"matchCriteriaId\": \"0B066E6A-B150-4D5F-8263-F955EB366806\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8_smp:*:*:*:*:*\", \"matchCriteriaId\": \"6D4A2EB4-9F3C-4FEC-96FA-339C6FBD8D6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_xeon:*:*:*:*:*\", \"matchCriteriaId\": \"2A58C85C-BF31-4EDB-9CEA-1F31EA0AEC58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7:*:*:*:*:*\", \"matchCriteriaId\": \"72587FF5-B82D-42DE-A35B-0ECA76C37D54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7_smp:*:*:*:*:*\", \"matchCriteriaId\": \"013D2D76-AFAD-4479-B814-8597D8F51B7C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3:*:*:*:*:*\", \"matchCriteriaId\": \"86F9C61A-913C-42BA-BD16-BF82F75AA84B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3_smp:*:*:*:*:*\", \"matchCriteriaId\": \"B6E51493-8AE7-4F18-85BD-D0444A297C1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4:*:*:*:*:*\", \"matchCriteriaId\": \"CD68B4B3-CCF4-4A64-8C67-F549CC905A06\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4_smp:*:*:*:*:*\", \"matchCriteriaId\": \"D9350C90-D7A3-4DFF-A574-D079A4DCC453\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc:*:*:*:*:*\", \"matchCriteriaId\": \"9A27FA94-0483-4DD7-A2C4-9FA246526243\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc_smp:*:*:*:*:*\", \"matchCriteriaId\": \"E2076DD5-3110-4C81-BD0B-3B2A4D75AAE7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B812DFE2-6FFA-4D31-839C-0CCB2B1310EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FC53528-A67F-42DF-B8DA-778A65893F9D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC106BDA-2EA4-41A2-AA01-6352A5C255B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB515243-7519-4CA4-9267-D9A6798CBC49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"B672E1B6-E8E9-473F-853F-906EA56D712E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EA23C4F-0848-4680-ACB0-CBC57D3F8C5E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F727CD3-D3C2-4648-9EC5-092DF3F73B13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B130EB7-A951-4717-A906-E2F602F7B69F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1765065-ABE5-478C-9ACC-EFFA8E4A7043\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D90502F-EC45-4ADC-9428-B94346DA660B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:*:x86_64:*:*:*:*:*\", \"matchCriteriaId\": \"79C73761-289A-4BEE-BC3F-A5EC4AC7B2CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8DE0233-BE28-4C0A-B9FB-2157F41F8D4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2422569B-02ED-4028-83D8-D778657596B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"E66E4653-1A55-4827-888B-E0776E32ED28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C8994CB-7F94-43FB-8B84-06AEBB34EAE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"95DD4647-564E-4067-A945-F52232C0A33A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CD39A7A-9172-4B85-B8FE-CEB94207A897\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81DE32C2-5B07-4812-9F88-000F5FB000C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02EED3D5-8F89-4B7F-A34B-52274B1A754F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F87AA89-F377-4BEB-B69F-809F5DA6176C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C27AF62E-A026-43E9-89E6-CD807CE9DF51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D343B121-C007-49F8-9DE8-AA05CE58FF0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7936B7EE-9CD1-4698-AD67-C619D0171A88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5738D628-0B2D-4F56-9427-2009BFCB6C11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E20AD05-586B-4493-9793-3FF8028CF887\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F43EBCB4-FCF4-479A-A44D-D913F7F09C77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"169446DE-67F8-4738-91FE-ED8058118F80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F76C298-81DC-43E4-8FC9-DC005A2116EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AB349B2-3F78-4197-882B-90ADB3BF645A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AC88830-A9BC-4607-B572-A4B502FC9FD0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"476CB3A5-D022-4F13-AAEF-CB6A5785516A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CFD5CDD-1709-44C7-82BD-BAFDC46990D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"860F9225-8A3F-492C-B72B-5EFFB322802C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57E23724-2CA4-4211-BB83-38661BE7E6AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D7BBB5F-44F7-467F-B934-33ABF744A107\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0478831E-87B2-441F-AEC2-403A35FED1D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6143DC1F-D62E-4DB2-AF43-30A07413D68B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"93F0834D-C5EA-4C96-8D6C-3123ECF78F8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1784CBC-BEAF-48E5-95A4-2A4BD5F9F1BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"31523E67-5E4F-43F7-9410-20CB3F287DAF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D9F976B-1328-40FE-A1F2-C1DF3F836604\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B627DE3-2702-4EB2-9733-253D315FB594\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"10E1B011-8D20-448E-9DD5-023DD30D1FE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A29A4BC-0442-458E-A874-BF0D0F2870FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"298266AB-2A36-4606-BF80-2185FC56C4D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C2658CA-56C2-494F-AC42-618EC413CBDF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD34526D-F2CC-44C5-991D-B1E41C327860\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2F0B900-34E9-4545-B7AE-AF0A4363EACE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B36F432D-FED1-4B8D-A458-BEDEEF306AB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"04F25DE0-CA8E-4F57-87A5-C30D89CC9E44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"F87F764B-4097-44FA-B96E-A5DA75E31F7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7025803-C679-44DB-ADEE-864E6CAAD9B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"24B879D6-4631-49A8-9366-75577DFB755D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5B76C21-70C8-4911-A24B-270F876EF7C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25379B32-D898-4E44-A740-978A129B5E05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B90F8F2-9549-413D-9676-3EF634D832B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"915E64EF-6EEC-4DE2-A285-5F3FCE389645\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"585BEE46-088A-494E-8E18-03F33F6BBEA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFF35478-B292-4A00-B985-CEEDE8B212C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E85846A-61BE-4896-B4A6-42A7E1DBA515\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6E3B925-031D-4F6D-915A-A16F0FFA878C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7344B707-6145-48BA-8BC9-9B140A260BCF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"390B1E09-7014-4A74-834C-806BBEBAF6F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEF02479-2124-4655-A38D-A4793D3B8A1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FB5CF04-B5B6-4DFB-B051-61EDA257019F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"A89DC9CD-C06F-4B9B-B376-900E65016296\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"15BED7A7-3E96-43EF-8B6F-3C94897C3AA1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C6FCAC4-B6C6-4125-B3AC-F30407AA7738\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"707ECC75-65B6-4B02-BE85-A4804549A2DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BFCEA98-C708-4E1E-B189-E6F96D28F07A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B753112-CCDE-4870-AA97-4AAA2946421A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79B3AFE7-F4FF-4144-9046-E5926E305A03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7616E197-ACCA-4191-A513-FD48417C7F88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EE2F94D-E8E0-4BB7-A910-378012580025\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66F5AE3B-B701-4579-B44A-0F7A4267852E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EBB1A21-3826-4BC5-A243-AF8F8D1D4728\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34E60197-56C3-485C-9609-B1C4A0E0FCB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1369C4A-EF3B-4805-9046-ADA38ED940C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC3639E1-B5E4-4DD6-80D4-BA07D192C42D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"54393D69-B368-4296-9798-D81570495C6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"6791A801-9E06-47DD-912F-D8594E2F6B3F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE90CCED-3A5B-46E3-A6B0-4865AB786289\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBFF6DE7-6D7C-469A-9B2D-2F6E915F55B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86E452E4-45A9-4469-BF69-F40B6598F0EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5751AC4-A60F-42C6-88E5-FC8CFEE6F696\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48777A01-8F36-4752-8F7A-1D1686C69A33\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42DA6A18-5AA1-4920-94C6-8D0BB73C5352\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E51F0211-2D3E-4260-AD63-E83AE4EC4AF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C4E1245-C6BB-462C-9E27-C608595DAE3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"747F1324-AEFA-496F-9447-12CD13114F60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"795C3B17-687E-4F33-AA99-8FEC16F14693\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B81A4DD-2ADE-4455-B517-5E4E0532D5A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BD589CC-666B-4FAA-BCF0-91C484BDDB09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CD622EE-A840-42E1-B6BF-4AA27D039B12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"900D6742-DE0F-45C5-A812-BF84088CB02A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"225CA94C-8C84-4FA6-95D0-160A0016FBFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D88ED3C4-64C5-44B2-9F23-E16087046C40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03FB31E5-190C-489A-AB30-910D2CC854F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF4A781A-4A41-466F-8426-10B40CF8BA1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9ED29B3F-456B-4767-8E59-8C19A3B7E1D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6316369-B54A-4E59-A022-E0610353B284\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"073C3CE0-E12D-4545-8460-5A1514271D50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AEB33DEA-13C7-4B36-AB8A-ED680679A071\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86DD0FCC-BB12-410D-8C82-AB99C7C5311E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83700989-8820-48DA-A9FE-6A77DF1E8439\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC9F4CEC-7781-468B-B460-4F487B7C6601\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67C75A62-8807-4821-9362-1E0D63C0A1B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"894D4812-D62F-489E-8D0E-5E9468CE8EC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1F92E01-4F08-4364-9E87-FFBC095E32E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9960640-F02D-4E81-A34B-1893D8FD7F38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9D00DAD-4F2D-45C7-B87C-85118D9DD855\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C398D26-7132-4A6E-9003-77246644451B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EED2DA2-2516-42E9-8A33-0FA64BF51DB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF425F00-41BA-4F59-A0DE-6362A1E9A142\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33577E79-1B6E-406D-A49B-2CEF1754F5D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B21D90E-5172-485E-87AC-F1681604AD7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C41F6822-92BF-43F5-8B3E-8BAF9E9A320D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"641EECFD-A985-4026-A53A-10FBE47EAD91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47595F81-2083-4236-A0B0-E2B98DD78402\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F5FC758-5A5D-466A-8386-5FC469F79F66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CCA5C83-5293-4107-8E6A-85F82ECF2C80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2D0AADC-BC34-40FB-BD69-37981DC8E971\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CA7EAC4-7696-41CE-8EE9-3E39DE226BD3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12547B6B-78F1-4426-81CE-5F208794658C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38429E64-276B-46D4-AACD-05349D6F6615\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E89640F8-313B-4A36-A591-36645D1EF838\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE0271F0-41F2-4096-8C91-DAD1A81AF855\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A40DCBB-B41B-468E-A918-6EA3F9A125E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"921B6A54-85E3-4867-8EDF-93EB86BAFBD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8A2C6F1-ED7E-4E51-BE72-BD744D554EE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B004CF1-0ACC-441C-9F61-9B20504F4ECC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04B42F06-AC6D-40F3-BC03-5126BED48F36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A8002C7-19E2-4F20-890E-4BA2029174D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34FC90C2-AED0-4EAF-B5E8-DE75961DA26E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7DA9C54-742C-4057-8BAB-18755B4A42D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84BBE8BE-EAE8-4F7A-85BD-94BBF64F30EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53037B40-D534-41D1-9895-8EDB0D884C3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5549096F-C640-463E-AD07-FD8D254CC098\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8DCAF19-879C-42BB-B56A-84504E79758A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B8ED186-B0FE-4AAC-9B20-DFAD75D7F677\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16_rc7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E55F2549-F813-4BD6-8933-6788D898ECB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E86E13B-EC92-47F3-94A9-DB515313011D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"980A6C7D-6175-4A44-8377-74AA7A9FD108\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C226902-04D9-4F32-866C-20225841ECF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"655DB612-AF49-4C17-AFB9-2E33EE8E0572\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EE30F34-EE81-4E1E-BF9F-A7A36B78B897\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1F65DF2-2794-47B7-9676-CCF150683CC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56C6C01B-4CED-4F37-A415-0603496C27DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC47887B-5608-47BE-85EE-563864461915\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF39E62B-EAB4-44B0-A421-2A71B7DD8341\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"809264F1-763D-4A8F-B206-222332DD8732\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A66ED53E-3139-4972-B027-D614BFFB8628\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85A3AB7A-1959-4A57-B83D-B2753C43649E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A60B265-5508-4EE0-980A-44BB0966FD7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C06F0037-DE20-4B4A-977F-BFCFAB026517\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:*:x86_32:*:*:*:*:*\", \"matchCriteriaId\": \"A2B1B229-B325-4D8C-B326-1FF6D85891F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"1817C772-D367-4ABE-B835-466D31A6DC89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"C667B8E4-64EB-4A05-84FF-B2243DEF757D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"9484B41A-DFB6-4481-80D8-440C711CEA53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"53D373AF-DE6B-428E-9F0F-F1D220900A4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2975DF7-F916-456C-BF7C-2694559E5282\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"784EB96E-2FD3-4F77-8DB6-4D6C7A928946\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A252C50-D63A-4FC0-A51E-A63A939D6AA1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"338BB401-8831-4094-9186-2B3CFA5903D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20F6269B-5F6B-4413-B14D-7AE5442E4CCD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"189D1246-F975-4411-A58B-343ED90485FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B914F7F-C6BD-4527-B1E9-7FD1E337A18C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"179147E4-5247-451D-9409-545D661BC158\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"4ED4E9DD-DDAD-46A8-9AD2-9CAE406F7575\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D97ED16-D6B7-4445-889C-4D6DE2EDC49A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2C2D5D4-9A4B-4CDF-8D71-D22EB5E97D5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFFB2843-A867-48EC-97D7-B106C7BBAED0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6554469E-F6AE-4EB0-880E-CBFD196FEE31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C20367B0-F722-4442-8B59-ABB0FEDB8CC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86A98A70-51E3-4556-8DC4-DD09CF370D1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"469EE3B0-3CC2-4AC2-86A0-2DF34205E707\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8EC547EB-9308-4477-8256-A0E04B42D6DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6940324-0383-4510-BA55-770E0A6B80B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB1E1A8B-6FA1-45AD-B034-EC34884527DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E3313D5-52E8-49B3-B145-170D9A26DA43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D3A5FD5-4C42-4B00-8473-D5650FAED9C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"480F035A-A59D-4113-A246-DF108BB2F591\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30D39E29-B2A0-4075-84AF-994C27AB0A68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19879317-B067-45DA-B497-21EBDDDC2521\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D220C745-28AD-4D04-B2D2-A090D229206E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4AF8895-7BF8-458E-B2BB-68699AABC023\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA768A9D-6C63-405E-9D14-5D68F8E93A91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF495E58-DA6C-402D-B381-4929CB8A502B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A591301C-C30F-44AC-90F0-709A18AA96E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7D2606B-00A6-4FA3-A00D-B1E8A80B947C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"610A93BB-70E3-4BF1-83E8-8A7388477F44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"821BD11F-3C6A-4424-BC9B-DFD786248B07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F55A024-9F8E-44F8-A0D8-696BC232524A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84595143-3B04-4CE8-81C0-28EEEC58CD0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32EE2B49-DDEB-4B49-A5F0-CAA161095A5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3ABFA33-8FA1-488E-A9BD-1593F495F595\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62F6DE3A-E6CC-4D7E-BD08-E43DC4182200\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50B422D1-6C6E-4359-A169-3EED78A1CF40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8CBD2D9-3765-40B2-A056-D71BE750CC01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8F4D967-ED04-42EA-8B3E-36301D39D651\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*\", \"matchCriteriaId\": \"C498EE89-7F07-4B1E-90E6-5897E6B04670\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*\", \"matchCriteriaId\": \"708656AF-92AE-4EAF-AF19-F457DB04ADB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B263AB8-74A4-4C73-915C-A02724C24B45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*\", \"matchCriteriaId\": \"A96D739B-9E8B-4D2F-9DED-4C9B313473CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*\", \"matchCriteriaId\": \"4ACDEFEE-B946-4232-8BD5-A9F7AA84ED85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"247E13CB-9B11-4B64-80AD-C0F8482CCC0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"903FE5D3-A9FB-466D-833B-448233BB0803\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"958EDC43-0848-4D93-9D07-6A085A5940B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD35F21D-0A28-4C14-BCF5-8EDA760701C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"3AAD8BE9-A05B-40E8-80DF-0B2878968BD6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2F19064-CFBF-4B3C-A0A1-CE62265CD592\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB759752-DC19-4750-838B-056063EFDC5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96A43C95-8569-40BE-9E5B-F9B3D0B9D188\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99662904-E5E3-4E81-B199-39707EAEB652\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"615BDD1D-36AA-4976-909B-F0F66BF1090C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"D123AAFE-3F17-45C4-9382-BA392FD022C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE8A26D6-1BDA-45F0-8F7C-F95986050E32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61A3EDF2-09D7-4116-AE46-D86E4B9602AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F320FA9F-C13D-4AA3-B838-A0E5D63E6A29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B179CF1D-084D-4B21-956F-E55AC6BDE026\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F1B4877-286A-44B5-9C5C-0403F75B2BAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"432CA976-6EFA-4D34-B5EA-CD772D067F93\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:x86_64:*:*:*:*:*\", \"matchCriteriaId\": \"1BACA0F0-B7B5-4C8B-8D9A-DAA803960AAF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E476195-657E-416E-BC16-44A18B06A133\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70460F6C-D6C0-4C1A-B13E-368705EAF223\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F26BA18-08AD-45FE-9F83-25CCB2E27270\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EBFF148-3EDA-4216-910B-8930D8C443C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"648C63F7-EA1D-4F2E-B8AF-1F380C83E542\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1697B855-4834-4633-A5C8-C1F7F13ACE0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FBAE75F-9145-4B9A-A6D8-E488C5326145\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFF566DA-0F04-48DA-AA40-565979C55328\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5990C6C2-2F66-4C4D-8224-74163865F410\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A45A9B9-4B19-4A5B-BC95-BCBC4EF00F12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C23AD176-3B99-4593-BCBD-13C1E579A13E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"034DFD7F-8919-4245-8480-7B272F591271\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CEBC606-6488-48CE-8AA8-5B8CC724D5D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A83C60AF-50A9-480E-860D-45E80AC0A6B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E249774-CE05-43D5-A5A3-7CCE24BB2AD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D42BA44-C69B-4170-9867-CABF93CA9BD6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5140380C-71BD-464F-AE53-1814C2653056\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B18EC0A7-8616-4039-B98B-E1216E035B05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22FB141B-FA2A-435D-8937-83FC0669CB20\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C59131C8-F66A-4380-9F6E-3FC14C7C8562\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5421616-4BF5-4269-8996-C3D2BA6AE2A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23FC6CE2-8717-4558-A309-A441D322F00E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"311BE336-7BB2-47C0-AED5-3DEA706C206F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AAC2E9D-0E82-4866-9046-ADD448418198\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67F2047A-5F17-4B59-9075-41A5DC5C1CD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A12DE15-E192-4B90-ADB7-A886B3746DD7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF6588E7-F4FA-40F5-8945-FC7B6094376E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8B59FCD-8161-48EF-844D-8FA1AB2FAA76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DA311B8-D32E-4853-9B07-58EAF1019D0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0F0F679-43C8-426E-A97E-C3B207A3331C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAE6A7F3-3D04-4119-874D-DA2FA86B7BE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA40BC48-D6B5-4424-B306-F99E85EBBCB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C2DF2BB-F94A-4692-AFDC-47C42F04081B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB286B42-E739-46CD-BC96-972CFFAECB0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc8:*:*:*:*:*:*\", \"matchCriteriaId\": \"7636014B-CC2A-43A3-9C9A-04B26AEB06D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc9:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4ED7CE5-3388-4CB9-AF60-A2AF19611327\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C75A8FC4-58D2-4B6A-9D8E-FF12DF52E249\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE21E2AE-9E01-471C-A419-6AB40A49C2F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADFC2D46-65D0-426F-9AF8-8C910AE91D49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11795F8E-7ACD-4597-9194-FC7241DCE057\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60F381E1-F3C5-49BE-B094-4D90E7B108F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D82A6217-CFA6-4E72-8BED-0297E13EABF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CEA1AF2-2DE7-4B38-987D-15FFA70F06B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7954A701-1671-4080-B1E6-47E0208FD28C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83E5F269-7711-447D-B798-0F5478E36299\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0138807-6313-4A3F-AB5A-4B7D4A9BE287\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4BA2227-F259-499D-BF50-5074B1E7DD3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78A896D0-032C-4467-9D57-E47E8C612704\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D1D4C8F-8C09-4A49-AFFD-33093AE7A437\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26BD805F-08EB-42EC-BC54-26A7278E5089\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:git7:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBEBA0F6-5453-4993-932B-BB8941DCC5CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"3463B83B-E46F-456E-98BA-801C59AEB337\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8A1A8F2-F892-4EDC-A5DA-1BBD6993E84E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"60EFBFAD-1AF4-49AC-A0E6-A88AB84CD919\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"05FD0767-03F3-416C-AB6D-6BC4A12220B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"8452D554-8DEB-4265-839C-6B40CCFB56B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"94F445F9-57A5-4453-BB5D-290349C04A80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"62C97D20-4152-47C4-B21B-8206CF49E20A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"217715A5-E69D-45C0-B8E4-5681528C651B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A87AD66C-4321-4459-8556-3B0BA38C493A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87A347E0-9C0B-4674-9363-3C36DA27AC45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E0F3DF0-6BD0-4560-9A13-C6493939D8B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4BE1DF7-99CB-416B-B6F9-EC40FBD7D1C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B93AF773-FBB4-4A4A-ADD5-ADA40C24CD36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38A55F08-88A9-42D5-A2B1-8B8C0D6DED09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3975EC77-D33D-4167-91BE-08237C3EE9D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A0F2534-C267-43D9-8365-C00CD979B052\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27430190-EB83-43C5-9584-4F65CF65151A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C386B13F-9D7C-45F8-B86A-886384144A8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29:git1:*:*:*:*:*:*\", \"matchCriteriaId\": \"32F95AB2-319C-4BDE-8D34-9FBE69A2FB6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D48FD9D7-E775-4E26-AEBF-01A09C404D6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"89EA3CF3-0AB7-4648-96BA-25E978D2C8C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29:rc2_git7:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E4DB179-F78F-4D36-A47D-557FB1B945DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29:rc8-kk:*:*:*:*:*:*\", \"matchCriteriaId\": \"23859759-4748-4A03-9D78-083C77CFF4AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A701E87D-B807-426E-9CD4-6721DBCABE19\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29.rc1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D5FC0A9-A78A-4D09-BDCC-208AFC899824\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29.rc2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DBFC9DD-B7C2-4FB2-A8F6-29FF50EFAAE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29.rc2-git1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54B3BFC1-4B0A-4D63-BFA2-CF6A51A8D2F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"E242D3DE-D1DC-406A-BCC3-C4380B7EC369\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30:rc4:x86_32:*:*:*:*:*\", \"matchCriteriaId\": \"06EFB3F7-2EAE-4A56-A9A1-E8C734E6B91E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"608FDE1E-B02A-45A2-8877-0E52A5BD0963\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.\"}, {\"lang\": \"es\", \"value\": \"Desbordamiento de memoria en el driver RTL8169 NIC (drivers/net/r8169.c) en el kernel de Linux anteriores a v2.6.30 permite a atacantes remotos producir una denegaci\\u00f3n de servicio (consumo de memoria del kernel y ca\\u00edda) a trav\\u00e9s de un paquete largo.\"}]",
"id": "CVE-2009-1389",
"lastModified": "2024-11-21T01:02:21.953",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2009-06-16T23:30:00.187",
"references": "[{\"url\": \"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=fdd7b4c3302c93f6833e338903ea77245eb510b4\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lkml.org/lkml/2009/6/8/194\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://marc.info/?l=linux-netdev\u0026m=123462461713724\u0026w=2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/35265\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35566\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/35847\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/36045\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/36051\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/36131\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/36327\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/37298\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/37471\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/40645\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://support.avaya.com/css/P8/documents/100067254\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://support.citrix.com/article/CTX123453\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://wiki.rpath.com/Advisories:rPSA-2009-0111\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1844\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1865\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2009:148\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2009/06/10/1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-1157.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-1193.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/505254/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/507985/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/35281\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securitytracker.com/id?1023507\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-807-1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3316\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2010/0219\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2010/1857\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=504726\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/51051\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10415\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8108\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=fdd7b4c3302c93f6833e338903ea77245eb510b4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lkml.org/lkml/2009/6/8/194\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://marc.info/?l=linux-netdev\u0026m=123462461713724\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/35265\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35566\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/35847\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/36045\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/36051\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/36131\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/36327\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/37298\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/37471\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/40645\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.avaya.com/css/P8/documents/100067254\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.citrix.com/article/CTX123453\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://wiki.rpath.com/Advisories:rPSA-2009-0111\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1844\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1865\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2009:148\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2009/06/10/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-1157.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-1193.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/505254/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/507985/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/35281\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1023507\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-807-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3316\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2010/0219\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2010/1857\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=504726\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/51051\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10415\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8108\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2009-1389\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2009-06-16T23:30:00.187\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de memoria en el driver RTL8169 NIC (drivers/net/r8169.c) en el kernel de Linux anteriores a v2.6.30 permite a atacantes remotos producir una denegaci\u00f3n de servicio (consumo de memoria del kernel y ca\u00edda) a trav\u00e9s de un paquete largo.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linux:kernel:2.6.24.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1760FDC9-BB79-4299-8A6D-482085EE5BD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linux:kernel:2.6.25.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56EEB157-5037-4EAD-8625-35B91B167111\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAEC8651-9291-4CAE-AA49-C1CA4C7AE450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FC560CC-F785-42D5-A25B-1BA02E7AC464\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142BCD48-8387-4D0C-A052-44DD4144CBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:*:64-bit_x86:*:*:*:*:*\",\"matchCriteriaId\":\"A12077FF-39D0-474A-AB6C-62926CC065B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:*:itanium_ia64_montecito:*:*:*:*:*\",\"matchCriteriaId\":\"508BC14E-41D8-4847-AE0F-7830E2EE0522\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BCA84E2-AC4A-430D-8A30-E660D2A232A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*\",\"matchCriteriaId\":\"2255842B-34CD-4062-886C-37161A065703\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0ED322D-004C-472E-A37F-89B78C55FE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*\",\"matchCriteriaId\":\"412F7334-C46B-4F61-B38A-2CA56B498151\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5967AF83-798D-4B1E-882A-5737FFC859C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A90D2123-D55B-4104-8D82-5B6365AA3B77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCCDFD49-D402-420E-92F5-20445A0FE139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A073700-E8A9-4F76-9265-2BE0D5AC9909\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*\",\"matchCriteriaId\":\"8877D178-1655-46E9-8F5A-2DD576601F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D55059C-B867-4E0F-B29C-9CD2C86915A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*\",\"matchCriteriaId\":\"8358E965-3689-4B05-8470-C4A1463FA0E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8220D81-9065-471F-9256-CFE7B9941555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2A55C17-C530-4898-BC95-DE4D495F0D7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C14A949-E2B8-4100-8ED4-645CB996B08A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"81941077-0011-4272-A8C7-21D0AFE7DECB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB445E3E-CCBD-4737-BE30-841B9A79D558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B2EDDD7-5B3E-45AA-BC42-A6FF516B8F57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"02F89C7A-24F2-4518-A605-78A5B7056A1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C43BA02-0686-42F0-B901-4CB88459E2D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2.27.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"241FF5F5-516B-4F77-ABAF-787DFEFEC1AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5301E27-8021-467C-A9A2-AF2137EF0299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"59393187-1D1E-45CD-BE0E-385F978E4834\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0CCDF6B-0365-4553-B161-3F6D68A58F72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9B2BB71-0489-40F6-9CB6-A95B96E92106\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"842ECCE2-60F0-41C0-9EAA-A43AF97F61AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79787868-2D77-4B55-AD61-C2B357CCE047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"05F0391C-D4CC-4652-A24C-DC47F4C3DC91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"56340FF9-EE77-4EB3-9720-240FAAEF39F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"79EB0E94-6AE8-4703-96BD-B927E0F2893F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B3F27D3-8F1D-4576-A584-1E2059CC67B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A1F1242-0F07-4D81-9175-3BA5B2C7B564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ECBCF2E-95B3-4BE9-9B93-6390AB578C7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CF4EC75-06A2-4BD4-A39A-183F00C46E11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5D260C-AE1C-47E9-A88C-B9C2B4349249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0934C49-5F88-4189-BD88-2F32C39C2F25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFC3618C-FBE8-4F7C-BECE-F2CDDF785599\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6501752-2595-4412-9140-C78EB9FD41CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9958C6-AB7D-4B67-9AA7-42B628CBC391\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"14B0A230-4054-4483-A3A7-9A5A286C7552\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D78F881-DB3A-423A-8DAD-314645B2B3EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D77D4CC4-7008-4E6F-A8CA-62DA244BB3AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16E3D04-EC66-41FD-9CFA-FE0C21952CAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F90242EF-048B-4539-AA41-87AA84875A9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C4E9325-2A70-4E15-9AAF-5588BF218055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"01402A85-B681-4DE0-B7BB-F52567DA29E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"70D1E088-5A9B-4CBF-A4FF-969201942CCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"455E647F-73DD-400A-AA19-3D93FE2E57AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABEBD63E-6194-4CB4-A1CE-E4FBB6F0A6E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:386:*:*:*:*:*\",\"matchCriteriaId\":\"27B3F220-7FE0-4D47-918B-C9CBFAD23808\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686:*:*:*:*:*\",\"matchCriteriaId\":\"813C1C54-697D-4170-8202-E07FF578815A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686_smp:*:*:*:*:*\",\"matchCriteriaId\":\"51403992-077A-4F6F-8722-DAAD30489DB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64:*:*:*:*:*\",\"matchCriteriaId\":\"BD22CEB2-838D-4D03-B1D0-2735CA5CA7EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8:*:*:*:*:*\",\"matchCriteriaId\":\"0B066E6A-B150-4D5F-8263-F955EB366806\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8_smp:*:*:*:*:*\",\"matchCriteriaId\":\"6D4A2EB4-9F3C-4FEC-96FA-339C6FBD8D6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_xeon:*:*:*:*:*\",\"matchCriteriaId\":\"2A58C85C-BF31-4EDB-9CEA-1F31EA0AEC58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7:*:*:*:*:*\",\"matchCriteriaId\":\"72587FF5-B82D-42DE-A35B-0ECA76C37D54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7_smp:*:*:*:*:*\",\"matchCriteriaId\":\"013D2D76-AFAD-4479-B814-8597D8F51B7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3:*:*:*:*:*\",\"matchCriteriaId\":\"86F9C61A-913C-42BA-BD16-BF82F75AA84B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3_smp:*:*:*:*:*\",\"matchCriteriaId\":\"B6E51493-8AE7-4F18-85BD-D0444A297C1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4:*:*:*:*:*\",\"matchCriteriaId\":\"CD68B4B3-CCF4-4A64-8C67-F549CC905A06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4_smp:*:*:*:*:*\",\"matchCriteriaId\":\"D9350C90-D7A3-4DFF-A574-D079A4DCC453\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc:*:*:*:*:*\",\"matchCriteriaId\":\"9A27FA94-0483-4DD7-A2C4-9FA246526243\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc_smp:*:*:*:*:*\",\"matchCriteriaId\":\"E2076DD5-3110-4C81-BD0B-3B2A4D75AAE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B812DFE2-6FFA-4D31-839C-0CCB2B1310EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FC53528-A67F-42DF-B8DA-778A65893F9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC106BDA-2EA4-41A2-AA01-6352A5C255B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB515243-7519-4CA4-9267-D9A6798CBC49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B672E1B6-E8E9-473F-853F-906EA56D712E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EA23C4F-0848-4680-ACB0-CBC57D3F8C5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F727CD3-D3C2-4648-9EC5-092DF3F73B13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B130EB7-A951-4717-A906-E2F602F7B69F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1765065-ABE5-478C-9ACC-EFFA8E4A7043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D90502F-EC45-4ADC-9428-B94346DA660B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"79C73761-289A-4BEE-BC3F-A5EC4AC7B2CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8DE0233-BE28-4C0A-B9FB-2157F41F8D4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2422569B-02ED-4028-83D8-D778657596B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E66E4653-1A55-4827-888B-E0776E32ED28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C8994CB-7F94-43FB-8B84-06AEBB34EAE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"95DD4647-564E-4067-A945-F52232C0A33A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CD39A7A-9172-4B85-B8FE-CEB94207A897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81DE32C2-5B07-4812-9F88-000F5FB000C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02EED3D5-8F89-4B7F-A34B-52274B1A754F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F87AA89-F377-4BEB-B69F-809F5DA6176C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C27AF62E-A026-43E9-89E6-CD807CE9DF51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D343B121-C007-49F8-9DE8-AA05CE58FF0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7936B7EE-9CD1-4698-AD67-C619D0171A88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5738D628-0B2D-4F56-9427-2009BFCB6C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E20AD05-586B-4493-9793-3FF8028CF887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F43EBCB4-FCF4-479A-A44D-D913F7F09C77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"169446DE-67F8-4738-91FE-ED8058118F80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F76C298-81DC-43E4-8FC9-DC005A2116EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AB349B2-3F78-4197-882B-90ADB3BF645A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AC88830-A9BC-4607-B572-A4B502FC9FD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"476CB3A5-D022-4F13-AAEF-CB6A5785516A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CFD5CDD-1709-44C7-82BD-BAFDC46990D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860F9225-8A3F-492C-B72B-5EFFB322802C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E23724-2CA4-4211-BB83-38661BE7E6AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D7BBB5F-44F7-467F-B934-33ABF744A107\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0478831E-87B2-441F-AEC2-403A35FED1D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6143DC1F-D62E-4DB2-AF43-30A07413D68B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"93F0834D-C5EA-4C96-8D6C-3123ECF78F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1784CBC-BEAF-48E5-95A4-2A4BD5F9F1BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"31523E67-5E4F-43F7-9410-20CB3F287DAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D9F976B-1328-40FE-A1F2-C1DF3F836604\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B627DE3-2702-4EB2-9733-253D315FB594\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"10E1B011-8D20-448E-9DD5-023DD30D1FE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A29A4BC-0442-458E-A874-BF0D0F2870FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"298266AB-2A36-4606-BF80-2185FC56C4D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C2658CA-56C2-494F-AC42-618EC413CBDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD34526D-F2CC-44C5-991D-B1E41C327860\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F0B900-34E9-4545-B7AE-AF0A4363EACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B36F432D-FED1-4B8D-A458-BEDEEF306AB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"04F25DE0-CA8E-4F57-87A5-C30D89CC9E44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F87F764B-4097-44FA-B96E-A5DA75E31F7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7025803-C679-44DB-ADEE-864E6CAAD9B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"24B879D6-4631-49A8-9366-75577DFB755D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5B76C21-70C8-4911-A24B-270F876EF7C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25379B32-D898-4E44-A740-978A129B5E05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B90F8F2-9549-413D-9676-3EF634D832B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"915E64EF-6EEC-4DE2-A285-5F3FCE389645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585BEE46-088A-494E-8E18-03F33F6BBEA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFF35478-B292-4A00-B985-CEEDE8B212C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E85846A-61BE-4896-B4A6-42A7E1DBA515\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6E3B925-031D-4F6D-915A-A16F0FFA878C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7344B707-6145-48BA-8BC9-9B140A260BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"390B1E09-7014-4A74-834C-806BBEBAF6F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEF02479-2124-4655-A38D-A4793D3B8A1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FB5CF04-B5B6-4DFB-B051-61EDA257019F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A89DC9CD-C06F-4B9B-B376-900E65016296\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"15BED7A7-3E96-43EF-8B6F-3C94897C3AA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C6FCAC4-B6C6-4125-B3AC-F30407AA7738\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"707ECC75-65B6-4B02-BE85-A4804549A2DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BFCEA98-C708-4E1E-B189-E6F96D28F07A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B753112-CCDE-4870-AA97-4AAA2946421A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79B3AFE7-F4FF-4144-9046-E5926E305A03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7616E197-ACCA-4191-A513-FD48417C7F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE2F94D-E8E0-4BB7-A910-378012580025\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F5AE3B-B701-4579-B44A-0F7A4267852E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EBB1A21-3826-4BC5-A243-AF8F8D1D4728\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34E60197-56C3-485C-9609-B1C4A0E0FCB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1369C4A-EF3B-4805-9046-ADA38ED940C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC3639E1-B5E4-4DD6-80D4-BA07D192C42D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"54393D69-B368-4296-9798-D81570495C6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6791A801-9E06-47DD-912F-D8594E2F6B3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE90CCED-3A5B-46E3-A6B0-4865AB786289\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBFF6DE7-6D7C-469A-9B2D-2F6E915F55B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E452E4-45A9-4469-BF69-F40B6598F0EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5751AC4-A60F-42C6-88E5-FC8CFEE6F696\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48777A01-8F36-4752-8F7A-1D1686C69A33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42DA6A18-5AA1-4920-94C6-8D0BB73C5352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51F0211-2D3E-4260-AD63-E83AE4EC4AF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C4E1245-C6BB-462C-9E27-C608595DAE3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"747F1324-AEFA-496F-9447-12CD13114F60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"795C3B17-687E-4F33-AA99-8FEC16F14693\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B81A4DD-2ADE-4455-B517-5E4E0532D5A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BD589CC-666B-4FAA-BCF0-91C484BDDB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD622EE-A840-42E1-B6BF-4AA27D039B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"900D6742-DE0F-45C5-A812-BF84088CB02A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225CA94C-8C84-4FA6-95D0-160A0016FBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D88ED3C4-64C5-44B2-9F23-E16087046C40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03FB31E5-190C-489A-AB30-910D2CC854F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF4A781A-4A41-466F-8426-10B40CF8BA1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ED29B3F-456B-4767-8E59-8C19A3B7E1D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6316369-B54A-4E59-A022-E0610353B284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"073C3CE0-E12D-4545-8460-5A1514271D50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB33DEA-13C7-4B36-AB8A-ED680679A071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86DD0FCC-BB12-410D-8C82-AB99C7C5311E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83700989-8820-48DA-A9FE-6A77DF1E8439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC9F4CEC-7781-468B-B460-4F487B7C6601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67C75A62-8807-4821-9362-1E0D63C0A1B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"894D4812-D62F-489E-8D0E-5E9468CE8EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F92E01-4F08-4364-9E87-FFBC095E32E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9960640-F02D-4E81-A34B-1893D8FD7F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9D00DAD-4F2D-45C7-B87C-85118D9DD855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C398D26-7132-4A6E-9003-77246644451B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EED2DA2-2516-42E9-8A33-0FA64BF51DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF425F00-41BA-4F59-A0DE-6362A1E9A142\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33577E79-1B6E-406D-A49B-2CEF1754F5D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B21D90E-5172-485E-87AC-F1681604AD7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C41F6822-92BF-43F5-8B3E-8BAF9E9A320D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"641EECFD-A985-4026-A53A-10FBE47EAD91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47595F81-2083-4236-A0B0-E2B98DD78402\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F5FC758-5A5D-466A-8386-5FC469F79F66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CCA5C83-5293-4107-8E6A-85F82ECF2C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2D0AADC-BC34-40FB-BD69-37981DC8E971\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CA7EAC4-7696-41CE-8EE9-3E39DE226BD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12547B6B-78F1-4426-81CE-5F208794658C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38429E64-276B-46D4-AACD-05349D6F6615\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E89640F8-313B-4A36-A591-36645D1EF838\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE0271F0-41F2-4096-8C91-DAD1A81AF855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A40DCBB-B41B-468E-A918-6EA3F9A125E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"921B6A54-85E3-4867-8EDF-93EB86BAFBD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8A2C6F1-ED7E-4E51-BE72-BD744D554EE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B004CF1-0ACC-441C-9F61-9B20504F4ECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04B42F06-AC6D-40F3-BC03-5126BED48F36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A8002C7-19E2-4F20-890E-4BA2029174D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34FC90C2-AED0-4EAF-B5E8-DE75961DA26E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7DA9C54-742C-4057-8BAB-18755B4A42D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84BBE8BE-EAE8-4F7A-85BD-94BBF64F30EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53037B40-D534-41D1-9895-8EDB0D884C3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5549096F-C640-463E-AD07-FD8D254CC098\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8DCAF19-879C-42BB-B56A-84504E79758A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8ED186-B0FE-4AAC-9B20-DFAD75D7F677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16_rc7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E55F2549-F813-4BD6-8933-6788D898ECB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E86E13B-EC92-47F3-94A9-DB515313011D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"980A6C7D-6175-4A44-8377-74AA7A9FD108\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C226902-04D9-4F32-866C-20225841ECF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"655DB612-AF49-4C17-AFB9-2E33EE8E0572\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE30F34-EE81-4E1E-BF9F-A7A36B78B897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1F65DF2-2794-47B7-9676-CCF150683CC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C6C01B-4CED-4F37-A415-0603496C27DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC47887B-5608-47BE-85EE-563864461915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF39E62B-EAB4-44B0-A421-2A71B7DD8341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"809264F1-763D-4A8F-B206-222332DD8732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A66ED53E-3139-4972-B027-D614BFFB8628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A3AB7A-1959-4A57-B83D-B2753C43649E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A60B265-5508-4EE0-980A-44BB0966FD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06F0037-DE20-4B4A-977F-BFCFAB026517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:*:x86_32:*:*:*:*:*\",\"matchCriteriaId\":\"A2B1B229-B325-4D8C-B326-1FF6D85891F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1817C772-D367-4ABE-B835-466D31A6DC89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C667B8E4-64EB-4A05-84FF-B2243DEF757D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9484B41A-DFB6-4481-80D8-440C711CEA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D373AF-DE6B-428E-9F0F-F1D220900A4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2975DF7-F916-456C-BF7C-2694559E5282\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"784EB96E-2FD3-4F77-8DB6-4D6C7A928946\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A252C50-D63A-4FC0-A51E-A63A939D6AA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"338BB401-8831-4094-9186-2B3CFA5903D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F6269B-5F6B-4413-B14D-7AE5442E4CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189D1246-F975-4411-A58B-343ED90485FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B914F7F-C6BD-4527-B1E9-7FD1E337A18C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"179147E4-5247-451D-9409-545D661BC158\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ED4E9DD-DDAD-46A8-9AD2-9CAE406F7575\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D97ED16-D6B7-4445-889C-4D6DE2EDC49A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C2D5D4-9A4B-4CDF-8D71-D22EB5E97D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFFB2843-A867-48EC-97D7-B106C7BBAED0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6554469E-F6AE-4EB0-880E-CBFD196FEE31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C20367B0-F722-4442-8B59-ABB0FEDB8CC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86A98A70-51E3-4556-8DC4-DD09CF370D1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"469EE3B0-3CC2-4AC2-86A0-2DF34205E707\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC547EB-9308-4477-8256-A0E04B42D6DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6940324-0383-4510-BA55-770E0A6B80B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB1E1A8B-6FA1-45AD-B034-EC34884527DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E3313D5-52E8-49B3-B145-170D9A26DA43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D3A5FD5-4C42-4B00-8473-D5650FAED9C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"480F035A-A59D-4113-A246-DF108BB2F591\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30D39E29-B2A0-4075-84AF-994C27AB0A68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19879317-B067-45DA-B497-21EBDDDC2521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D220C745-28AD-4D04-B2D2-A090D229206E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4AF8895-7BF8-458E-B2BB-68699AABC023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA768A9D-6C63-405E-9D14-5D68F8E93A91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF495E58-DA6C-402D-B381-4929CB8A502B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A591301C-C30F-44AC-90F0-709A18AA96E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7D2606B-00A6-4FA3-A00D-B1E8A80B947C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"610A93BB-70E3-4BF1-83E8-8A7388477F44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"821BD11F-3C6A-4424-BC9B-DFD786248B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F55A024-9F8E-44F8-A0D8-696BC232524A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84595143-3B04-4CE8-81C0-28EEEC58CD0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32EE2B49-DDEB-4B49-A5F0-CAA161095A5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3ABFA33-8FA1-488E-A9BD-1593F495F595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62F6DE3A-E6CC-4D7E-BD08-E43DC4182200\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50B422D1-6C6E-4359-A169-3EED78A1CF40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8CBD2D9-3765-40B2-A056-D71BE750CC01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F4D967-ED04-42EA-8B3E-36301D39D651\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C498EE89-7F07-4B1E-90E6-5897E6B04670\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*\",\"matchCriteriaId\":\"708656AF-92AE-4EAF-AF19-F457DB04ADB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B263AB8-74A4-4C73-915C-A02724C24B45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*\",\"matchCriteriaId\":\"A96D739B-9E8B-4D2F-9DED-4C9B313473CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ACDEFEE-B946-4232-8BD5-A9F7AA84ED85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"247E13CB-9B11-4B64-80AD-C0F8482CCC0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"903FE5D3-A9FB-466D-833B-448233BB0803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"958EDC43-0848-4D93-9D07-6A085A5940B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD35F21D-0A28-4C14-BCF5-8EDA760701C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AAD8BE9-A05B-40E8-80DF-0B2878968BD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2F19064-CFBF-4B3C-A0A1-CE62265CD592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB759752-DC19-4750-838B-056063EFDC5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96A43C95-8569-40BE-9E5B-F9B3D0B9D188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99662904-E5E3-4E81-B199-39707EAEB652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615BDD1D-36AA-4976-909B-F0F66BF1090C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"D123AAFE-3F17-45C4-9382-BA392FD022C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE8A26D6-1BDA-45F0-8F7C-F95986050E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61A3EDF2-09D7-4116-AE46-D86E4B9602AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F320FA9F-C13D-4AA3-B838-A0E5D63E6A29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B179CF1D-084D-4B21-956F-E55AC6BDE026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F1B4877-286A-44B5-9C5C-0403F75B2BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"432CA976-6EFA-4D34-B5EA-CD772D067F93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"1BACA0F0-B7B5-4C8B-8D9A-DAA803960AAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E476195-657E-416E-BC16-44A18B06A133\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70460F6C-D6C0-4C1A-B13E-368705EAF223\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F26BA18-08AD-45FE-9F83-25CCB2E27270\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EBFF148-3EDA-4216-910B-8930D8C443C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"648C63F7-EA1D-4F2E-B8AF-1F380C83E542\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1697B855-4834-4633-A5C8-C1F7F13ACE0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FBAE75F-9145-4B9A-A6D8-E488C5326145\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFF566DA-0F04-48DA-AA40-565979C55328\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5990C6C2-2F66-4C4D-8224-74163865F410\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A45A9B9-4B19-4A5B-BC95-BCBC4EF00F12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C23AD176-3B99-4593-BCBD-13C1E579A13E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"034DFD7F-8919-4245-8480-7B272F591271\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CEBC606-6488-48CE-8AA8-5B8CC724D5D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A83C60AF-50A9-480E-860D-45E80AC0A6B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E249774-CE05-43D5-A5A3-7CCE24BB2AD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D42BA44-C69B-4170-9867-CABF93CA9BD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5140380C-71BD-464F-AE53-1814C2653056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B18EC0A7-8616-4039-B98B-E1216E035B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22FB141B-FA2A-435D-8937-83FC0669CB20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C59131C8-F66A-4380-9F6E-3FC14C7C8562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5421616-4BF5-4269-8996-C3D2BA6AE2A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23FC6CE2-8717-4558-A309-A441D322F00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"311BE336-7BB2-47C0-AED5-3DEA706C206F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AAC2E9D-0E82-4866-9046-ADD448418198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67F2047A-5F17-4B59-9075-41A5DC5C1CD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A12DE15-E192-4B90-ADB7-A886B3746DD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF6588E7-F4FA-40F5-8945-FC7B6094376E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B59FCD-8161-48EF-844D-8FA1AB2FAA76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DA311B8-D32E-4853-9B07-58EAF1019D0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0F0F679-43C8-426E-A97E-C3B207A3331C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAE6A7F3-3D04-4119-874D-DA2FA86B7BE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA40BC48-D6B5-4424-B306-F99E85EBBCB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C2DF2BB-F94A-4692-AFDC-47C42F04081B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB286B42-E739-46CD-BC96-972CFFAECB0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"7636014B-CC2A-43A3-9C9A-04B26AEB06D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc9:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4ED7CE5-3388-4CB9-AF60-A2AF19611327\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C75A8FC4-58D2-4B6A-9D8E-FF12DF52E249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE21E2AE-9E01-471C-A419-6AB40A49C2F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADFC2D46-65D0-426F-9AF8-8C910AE91D49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11795F8E-7ACD-4597-9194-FC7241DCE057\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60F381E1-F3C5-49BE-B094-4D90E7B108F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D82A6217-CFA6-4E72-8BED-0297E13EABF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CEA1AF2-2DE7-4B38-987D-15FFA70F06B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7954A701-1671-4080-B1E6-47E0208FD28C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83E5F269-7711-447D-B798-0F5478E36299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0138807-6313-4A3F-AB5A-4B7D4A9BE287\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4BA2227-F259-499D-BF50-5074B1E7DD3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78A896D0-032C-4467-9D57-E47E8C612704\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D1D4C8F-8C09-4A49-AFFD-33093AE7A437\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26BD805F-08EB-42EC-BC54-26A7278E5089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:git7:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBEBA0F6-5453-4993-932B-BB8941DCC5CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3463B83B-E46F-456E-98BA-801C59AEB337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8A1A8F2-F892-4EDC-A5DA-1BBD6993E84E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"60EFBFAD-1AF4-49AC-A0E6-A88AB84CD919\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"05FD0767-03F3-416C-AB6D-6BC4A12220B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"8452D554-8DEB-4265-839C-6B40CCFB56B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"94F445F9-57A5-4453-BB5D-290349C04A80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"62C97D20-4152-47C4-B21B-8206CF49E20A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"217715A5-E69D-45C0-B8E4-5681528C651B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A87AD66C-4321-4459-8556-3B0BA38C493A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87A347E0-9C0B-4674-9363-3C36DA27AC45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E0F3DF0-6BD0-4560-9A13-C6493939D8B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4BE1DF7-99CB-416B-B6F9-EC40FBD7D1C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B93AF773-FBB4-4A4A-ADD5-ADA40C24CD36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38A55F08-88A9-42D5-A2B1-8B8C0D6DED09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3975EC77-D33D-4167-91BE-08237C3EE9D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A0F2534-C267-43D9-8365-C00CD979B052\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27430190-EB83-43C5-9584-4F65CF65151A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C386B13F-9D7C-45F8-B86A-886384144A8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:git1:*:*:*:*:*:*\",\"matchCriteriaId\":\"32F95AB2-319C-4BDE-8D34-9FBE69A2FB6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D48FD9D7-E775-4E26-AEBF-01A09C404D6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"89EA3CF3-0AB7-4648-96BA-25E978D2C8C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc2_git7:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E4DB179-F78F-4D36-A47D-557FB1B945DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc8-kk:*:*:*:*:*:*\",\"matchCriteriaId\":\"23859759-4748-4A03-9D78-083C77CFF4AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A701E87D-B807-426E-9CD4-6721DBCABE19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D5FC0A9-A78A-4D09-BDCC-208AFC899824\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.rc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DBFC9DD-B7C2-4FB2-A8F6-29FF50EFAAE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.rc2-git1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54B3BFC1-4B0A-4D63-BFA2-CF6A51A8D2F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E242D3DE-D1DC-406A-BCC3-C4380B7EC369\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc4:x86_32:*:*:*:*:*\",\"matchCriteriaId\":\"06EFB3F7-2EAE-4A56-A9A1-E8C734E6B91E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"608FDE1E-B02A-45A2-8877-0E52A5BD0963\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=fdd7b4c3302c93f6833e338903ea77245eb510b4\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lkml.org/lkml/2009/6/8/194\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://marc.info/?l=linux-netdev\u0026m=123462461713724\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/35265\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35566\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/35847\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/36045\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/36051\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/36131\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/36327\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/37298\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/37471\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/40645\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/css/P8/documents/100067254\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.citrix.com/article/CTX123453\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2009-0111\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1844\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1865\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:148\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/06/10/1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1157.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1193.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/505254/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/35281\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id?1023507\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-807-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0219\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/1857\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=504726\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/51051\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10415\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8108\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=fdd7b4c3302c93f6833e338903ea77245eb510b4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lkml.org/lkml/2009/6/8/194\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://marc.info/?l=linux-netdev\u0026m=123462461713724\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35265\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35566\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35847\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36045\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36051\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36131\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36327\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/37298\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/37471\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/40645\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/css/P8/documents/100067254\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.citrix.com/article/CTX123453\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2009-0111\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1844\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1865\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:148\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/06/10/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1157.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1193.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/505254/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/35281\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1023507\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-807-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0219\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/1857\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=504726\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/51051\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10415\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8108\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTA-2010-AVI-031
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité dans Citrix XenServer permet entre autres l'exécution de code arbitraire à distance.
Description
Une vulnérabilité dans le pilote réseau RealTek 8169 Linux de Citrix XenServer peut conduire à l'arrêt inopiné de la machine hôte ou à l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Citrix XenServer 5.0 Update 3 et versions ant\u00e9rieures ;",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer 5.5.",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 dans le pilote r\u00e9seau RealTek 8169 Linux de Citrix\nXenServer peut conduire \u00e0 l\u0027arr\u00eat inopin\u00e9 de la machine h\u00f4te ou \u00e0\nl\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
}
],
"links": [],
"reference": "CERTA-2010-AVI-031",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-01-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans Citrix XenServer permet entre autres l\u0027ex\u00e9cution\nde code arbitraire \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Citrix XenServer",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX123453 du 25 janvier 2010",
"url": "http://support.citrix.com/article/CTX123453"
}
]
}
CERTA-2009-AVI-513
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités découvertes dans les produits VMware peuvent être exploitées à distance par un utilisateur malintentionné afin de compromettre le système vulnérable ou encore d'entraver son bon fonctionnement.
Description
Les vulnérabilités présentes dans les produits VMware peuvent être exploitées afin de porter atteinte à l'intégrité et à la confidentialité des données, de réaliser un déni de service, d'injecter et d'exécuter indirectement du code arbitraire, d'élever ses privilèges ou d'exécuter du code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | VMware Server 2.x ; | ||
| VMware | ESXi | VMware ESXi 3.x ; | ||
| VMware | N/A | VMware vMA 4.x. | ||
| VMware | N/A | VMware ESX Server 4.x ; | ||
| VMware | N/A | VMware ESX Server 2.x ; | ||
| VMware | N/A | VMware ESX Server 3.x ; | ||
| VMware | ESXi | VMware ESXi 4.x ; | ||
| VMware | vCenter Server | VMware vCenter Server 4.x ; | ||
| VMware | N/A | VMware VirtualCenter 2.x ; |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware Server 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 3.x ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vMA 4.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 4.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 3.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 4.x ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCenter Server 4.x ;",
"product": {
"name": "vCenter Server",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware VirtualCenter 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLes vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans les produits VMware peuvent \u00eatre\nexploit\u00e9es afin de porter atteinte \u00e0 l\u0027int\u00e9grit\u00e9 et \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, de r\u00e9aliser un d\u00e9ni de service, d\u0027injecter et d\u0027ex\u00e9cuter\nindirectement du code arbitraire, d\u0027\u00e9lever ses privil\u00e8ges ou d\u0027ex\u00e9cuter\ndu code arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2724",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2724"
},
{
"name": "CVE-2009-0676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0676"
},
{
"name": "CVE-2009-2721",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2721"
},
{
"name": "CVE-2008-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3143"
},
{
"name": "CVE-2009-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2692"
},
{
"name": "CVE-2009-2406",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2406"
},
{
"name": "CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
},
{
"name": "CVE-2008-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0002"
},
{
"name": "CVE-2009-1106",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1106"
},
{
"name": "CVE-2009-1072",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1072"
},
{
"name": "CVE-2008-4307",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4307"
},
{
"name": "CVE-2009-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1104"
},
{
"name": "CVE-2009-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2407"
},
{
"name": "CVE-2008-3142",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3142"
},
{
"name": "CVE-2009-1101",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1101"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2009-1385",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
},
{
"name": "CVE-2009-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0746"
},
{
"name": "CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"name": "CVE-2007-5966",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
},
{
"name": "CVE-2009-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2719"
},
{
"name": "CVE-2008-4864",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4864"
},
{
"name": "CVE-2009-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2417"
},
{
"name": "CVE-2009-1439",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1439"
},
{
"name": "CVE-2009-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0322"
},
{
"name": "CVE-2009-1895",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
},
{
"name": "CVE-2009-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
},
{
"name": "CVE-2009-0748",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0748"
},
{
"name": "CVE-2008-3144",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3144"
},
{
"name": "CVE-2009-0747",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0747"
},
{
"name": "CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"name": "CVE-2009-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1095"
},
{
"name": "CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"name": "CVE-2009-0675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0675"
},
{
"name": "CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"name": "CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"name": "CVE-2009-1102",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1102"
},
{
"name": "CVE-2009-1630",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1630"
},
{
"name": "CVE-2009-0269",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0269"
},
{
"name": "CVE-2008-3528",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3528"
},
{
"name": "CVE-2008-5031",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5031"
},
{
"name": "CVE-2008-1721",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1721"
},
{
"name": "CVE-2009-1388",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1388"
},
{
"name": "CVE-2009-1192",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1192"
},
{
"name": "CVE-2009-2720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2720"
},
{
"name": "CVE-2009-0834",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
},
{
"name": "CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"name": "CVE-2009-2848",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2848"
},
{
"name": "CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"name": "CVE-2008-1232",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
},
{
"name": "CVE-2009-0159",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0159"
},
{
"name": "CVE-2009-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0778"
},
{
"name": "CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"name": "CVE-2009-1099",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1099"
},
{
"name": "CVE-2009-1252",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1252"
},
{
"name": "CVE-2009-2698",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2698"
},
{
"name": "CVE-2008-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
},
{
"name": "CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"name": "CVE-2009-2723",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2723"
},
{
"name": "CVE-2009-1107",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1107"
},
{
"name": "CVE-2009-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2716"
},
{
"name": "CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"name": "CVE-2008-1947",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1947"
},
{
"name": "CVE-2009-1105",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1105"
},
{
"name": "CVE-2007-6286",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6286"
},
{
"name": "CVE-2009-0028",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0028"
},
{
"name": "CVE-2009-1337",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1337"
},
{
"name": "CVE-2009-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2007-2052",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2052"
},
{
"name": "CVE-2009-1336",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1336"
},
{
"name": "CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"name": "CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"name": "CVE-2007-4965",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4965"
},
{
"name": "CVE-2009-1633",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1633"
},
{
"name": "CVE-2009-2722",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2722"
},
{
"name": "CVE-2008-5700",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5700"
},
{
"name": "CVE-2009-1103",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1103"
},
{
"name": "CVE-2009-1100",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1100"
},
{
"name": "CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"name": "CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"name": "CVE-2009-1096",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1096"
},
{
"name": "CVE-2009-1098",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1098"
},
{
"name": "CVE-2009-0787",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0787"
},
{
"name": "CVE-2008-1887",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1887"
},
{
"name": "CVE-2009-1097",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1097"
},
{
"name": "CVE-2009-2847",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2847"
},
{
"name": "CVE-2008-2315",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2315"
},
{
"name": "CVE-2009-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0696"
},
{
"name": "CVE-2009-2718",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2718"
},
{
"name": "CVE-2009-0745",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0745"
},
{
"name": "CVE-2009-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1093"
}
],
"links": [],
"reference": "CERTA-2009-AVI-513",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-11-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans les produits VMware peuvent\n\u00eatre exploit\u00e9es \u00e0 distance par un utilisateur malintentionn\u00e9 afin de\ncompromettre le syst\u00e8me vuln\u00e9rable ou encore d\u0027entraver son bon\nfonctionnement.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware du 20 novembre 2009",
"url": "http://lists.vmware.com/pipermail/security-announce/2009/000070.html"
}
]
}
CERTA-2010-AVI-031
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité dans Citrix XenServer permet entre autres l'exécution de code arbitraire à distance.
Description
Une vulnérabilité dans le pilote réseau RealTek 8169 Linux de Citrix XenServer peut conduire à l'arrêt inopiné de la machine hôte ou à l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Citrix XenServer 5.0 Update 3 et versions ant\u00e9rieures ;",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer 5.5.",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 dans le pilote r\u00e9seau RealTek 8169 Linux de Citrix\nXenServer peut conduire \u00e0 l\u0027arr\u00eat inopin\u00e9 de la machine h\u00f4te ou \u00e0\nl\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
}
],
"links": [],
"reference": "CERTA-2010-AVI-031",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-01-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans Citrix XenServer permet entre autres l\u0027ex\u00e9cution\nde code arbitraire \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Citrix XenServer",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX123453 du 25 janvier 2010",
"url": "http://support.citrix.com/article/CTX123453"
}
]
}
CERTA-2009-AVI-513
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités découvertes dans les produits VMware peuvent être exploitées à distance par un utilisateur malintentionné afin de compromettre le système vulnérable ou encore d'entraver son bon fonctionnement.
Description
Les vulnérabilités présentes dans les produits VMware peuvent être exploitées afin de porter atteinte à l'intégrité et à la confidentialité des données, de réaliser un déni de service, d'injecter et d'exécuter indirectement du code arbitraire, d'élever ses privilèges ou d'exécuter du code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | VMware Server 2.x ; | ||
| VMware | ESXi | VMware ESXi 3.x ; | ||
| VMware | N/A | VMware vMA 4.x. | ||
| VMware | N/A | VMware ESX Server 4.x ; | ||
| VMware | N/A | VMware ESX Server 2.x ; | ||
| VMware | N/A | VMware ESX Server 3.x ; | ||
| VMware | ESXi | VMware ESXi 4.x ; | ||
| VMware | vCenter Server | VMware vCenter Server 4.x ; | ||
| VMware | N/A | VMware VirtualCenter 2.x ; |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware Server 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 3.x ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vMA 4.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 4.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 3.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 4.x ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCenter Server 4.x ;",
"product": {
"name": "vCenter Server",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware VirtualCenter 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLes vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans les produits VMware peuvent \u00eatre\nexploit\u00e9es afin de porter atteinte \u00e0 l\u0027int\u00e9grit\u00e9 et \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, de r\u00e9aliser un d\u00e9ni de service, d\u0027injecter et d\u0027ex\u00e9cuter\nindirectement du code arbitraire, d\u0027\u00e9lever ses privil\u00e8ges ou d\u0027ex\u00e9cuter\ndu code arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2724",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2724"
},
{
"name": "CVE-2009-0676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0676"
},
{
"name": "CVE-2009-2721",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2721"
},
{
"name": "CVE-2008-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3143"
},
{
"name": "CVE-2009-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2692"
},
{
"name": "CVE-2009-2406",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2406"
},
{
"name": "CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
},
{
"name": "CVE-2008-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0002"
},
{
"name": "CVE-2009-1106",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1106"
},
{
"name": "CVE-2009-1072",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1072"
},
{
"name": "CVE-2008-4307",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4307"
},
{
"name": "CVE-2009-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1104"
},
{
"name": "CVE-2009-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2407"
},
{
"name": "CVE-2008-3142",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3142"
},
{
"name": "CVE-2009-1101",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1101"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2009-1385",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
},
{
"name": "CVE-2009-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0746"
},
{
"name": "CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"name": "CVE-2007-5966",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
},
{
"name": "CVE-2009-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2719"
},
{
"name": "CVE-2008-4864",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4864"
},
{
"name": "CVE-2009-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2417"
},
{
"name": "CVE-2009-1439",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1439"
},
{
"name": "CVE-2009-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0322"
},
{
"name": "CVE-2009-1895",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
},
{
"name": "CVE-2009-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
},
{
"name": "CVE-2009-0748",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0748"
},
{
"name": "CVE-2008-3144",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3144"
},
{
"name": "CVE-2009-0747",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0747"
},
{
"name": "CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"name": "CVE-2009-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1095"
},
{
"name": "CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"name": "CVE-2009-0675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0675"
},
{
"name": "CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"name": "CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"name": "CVE-2009-1102",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1102"
},
{
"name": "CVE-2009-1630",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1630"
},
{
"name": "CVE-2009-0269",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0269"
},
{
"name": "CVE-2008-3528",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3528"
},
{
"name": "CVE-2008-5031",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5031"
},
{
"name": "CVE-2008-1721",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1721"
},
{
"name": "CVE-2009-1388",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1388"
},
{
"name": "CVE-2009-1192",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1192"
},
{
"name": "CVE-2009-2720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2720"
},
{
"name": "CVE-2009-0834",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
},
{
"name": "CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"name": "CVE-2009-2848",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2848"
},
{
"name": "CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"name": "CVE-2008-1232",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
},
{
"name": "CVE-2009-0159",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0159"
},
{
"name": "CVE-2009-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0778"
},
{
"name": "CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"name": "CVE-2009-1099",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1099"
},
{
"name": "CVE-2009-1252",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1252"
},
{
"name": "CVE-2009-2698",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2698"
},
{
"name": "CVE-2008-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
},
{
"name": "CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"name": "CVE-2009-2723",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2723"
},
{
"name": "CVE-2009-1107",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1107"
},
{
"name": "CVE-2009-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2716"
},
{
"name": "CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"name": "CVE-2008-1947",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1947"
},
{
"name": "CVE-2009-1105",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1105"
},
{
"name": "CVE-2007-6286",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6286"
},
{
"name": "CVE-2009-0028",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0028"
},
{
"name": "CVE-2009-1337",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1337"
},
{
"name": "CVE-2009-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2007-2052",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2052"
},
{
"name": "CVE-2009-1336",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1336"
},
{
"name": "CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"name": "CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"name": "CVE-2007-4965",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4965"
},
{
"name": "CVE-2009-1633",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1633"
},
{
"name": "CVE-2009-2722",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2722"
},
{
"name": "CVE-2008-5700",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5700"
},
{
"name": "CVE-2009-1103",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1103"
},
{
"name": "CVE-2009-1100",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1100"
},
{
"name": "CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"name": "CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"name": "CVE-2009-1096",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1096"
},
{
"name": "CVE-2009-1098",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1098"
},
{
"name": "CVE-2009-0787",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0787"
},
{
"name": "CVE-2008-1887",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1887"
},
{
"name": "CVE-2009-1097",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1097"
},
{
"name": "CVE-2009-2847",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2847"
},
{
"name": "CVE-2008-2315",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2315"
},
{
"name": "CVE-2009-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0696"
},
{
"name": "CVE-2009-2718",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2718"
},
{
"name": "CVE-2009-0745",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0745"
},
{
"name": "CVE-2009-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1093"
}
],
"links": [],
"reference": "CERTA-2009-AVI-513",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-11-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans les produits VMware peuvent\n\u00eatre exploit\u00e9es \u00e0 distance par un utilisateur malintentionn\u00e9 afin de\ncompromettre le syst\u00e8me vuln\u00e9rable ou encore d\u0027entraver son bon\nfonctionnement.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware du 20 novembre 2009",
"url": "http://lists.vmware.com/pipermail/security-announce/2009/000070.html"
}
]
}
RHSA-2009:1193
Vulnerability from csaf_redhat - Published: 2009-08-04 13:10 - Updated: 2025-11-21 17:34Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
The ptrace_start function in kernel/ptrace.c in the Linux kernel 2.6.18 does not properly handle simultaneous execution of the do_coredump function, which allows local users to cause a denial of service (deadlock) via vectors involving the ptrace system call and a coredumping thread.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* the possibility of a timeout value overflow was found in the Linux kernel\nhigh-resolution timers functionality, hrtimers. This could allow a local,\nunprivileged user to execute arbitrary code, or cause a denial of service\n(kernel panic). (CVE-2007-5966, Important)\n\n* a flaw was found in the Intel PRO/1000 network driver in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than could be handled, which could lead to a remote\ndenial of service or code execution. (CVE-2009-1389, Important)\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* Ramon de Carvalho Valle reported two flaws in the Linux kernel eCryptfs\nimplementation. A local attacker with permissions to perform an eCryptfs\nmount could modify the metadata of the files in that eCrypfts mount to\ncause a buffer overflow, leading to a denial of service or privilege\nescalation. (CVE-2009-2406, CVE-2009-2407, Important)\n\n* Konstantin Khlebnikov discovered a race condition in the ptrace\nimplementation in the Linux kernel. This race condition can occur when the\nprocess tracing and the process being traced participate in a core dump. A\nlocal, unprivileged user could use this flaw to trigger a deadlock,\nresulting in a partial denial of service. (CVE-2009-1388, Moderate)\n\nBug fixes (see References below for a link to more detailed notes):\n\n* possible dom0 crash when a Xen para-virtualized guest was installed while\nanother para-virtualized guest was rebooting. (BZ#497812)\n\n* no directory removal audit record if the directory and its subtree were\nrecursively watched by an audit rule. (BZ#507561)\n\n* running \"echo 1 \u003e /proc/sys/vm/drop_caches\" under high memory load could\ncause a kernel panic. (BZ#503692)\n\n* on 32-bit systems, core dumps for some multithreaded applications did not\ninclude all thread information. (BZ#505322)\n\n* a stack buffer used by get_event_name() was too small for nul terminator\nsprintf() writes. This could lead to an invalid pointer or kernel panic.\n(BZ#506906)\n\n* when using the aic94xx driver, systems with SATA drives may not boot due\nto a libsas bug. (BZ#506029)\n\n* Wacom Cintiq 21UX and Intuos stylus buttons were handled incorrectly when\nmoved away from and back to these tablets. (BZ#508275)\n\n* CPU \"soft lockup\" messages and possibe system hangs on systems with\ncertain Broadcom network devices and running the Linux kernel from the\nkernel-xen package. (BZ#503689)\n\n* on 64-bit PowerPC, getitimer() failed for programs using the ITIMER_REAL\ntimer that were also compiled for 64-bit systems. This caused such programs\nto abort. (BZ#510018)\n\n* write operations could be blocked even when using O_NONBLOCK. (BZ#510239)\n\n* the \"pci=nomsi\" option was required for installing and booting Red Hat\nEnterprise Linux 5.2 on systems with VIA VT3364 chipsets. (BZ#507529)\n\n* shutting down, destroying, or migrating Xen guests with large amounts of\nmemory could cause other guests to be temporarily unresponsive. (BZ#512311)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. Systems must be rebooted for this update\nto take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1193",
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.4/html/Technical_Notes/kernel.html#RHSA-2009-1193",
"url": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.4/html/Technical_Notes/kernel.html#RHSA-2009-1193"
},
{
"category": "external",
"summary": "453135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
},
{
"category": "external",
"summary": "497812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=497812"
},
{
"category": "external",
"summary": "502981",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
},
{
"category": "external",
"summary": "503689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503689"
},
{
"category": "external",
"summary": "503692",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503692"
},
{
"category": "external",
"summary": "504263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504263"
},
{
"category": "external",
"summary": "504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "505322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=505322"
},
{
"category": "external",
"summary": "506029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=506029"
},
{
"category": "external",
"summary": "506906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=506906"
},
{
"category": "external",
"summary": "507529",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=507529"
},
{
"category": "external",
"summary": "507561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=507561"
},
{
"category": "external",
"summary": "508275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=508275"
},
{
"category": "external",
"summary": "510018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510018"
},
{
"category": "external",
"summary": "510239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510239"
},
{
"category": "external",
"summary": "511171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
},
{
"category": "external",
"summary": "512311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512311"
},
{
"category": "external",
"summary": "512861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512861"
},
{
"category": "external",
"summary": "512885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512885"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1193.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:34:59+00:00",
"generator": {
"date": "2025-11-21T17:34:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1193",
"initial_release_date": "2009-08-04T13:10:00+00:00",
"revision_history": [
{
"date": "2009-08-04T13:10:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-08-04T09:15:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:34:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product": {
"name": "Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:5.3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.4.1.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.src",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.src",
"product_id": "kernel-0:2.6.18-128.4.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.4.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-128.4.1.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.4.1.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.src",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5966",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2007-12-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "453135"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: non-root can trigger cpu_idle soft lockup",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and 4.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5966"
},
{
"category": "external",
"summary": "RHBZ#453135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5966",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966"
}
],
"release_date": "2007-12-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: non-root can trigger cpu_idle soft lockup"
},
{
"cve": "CVE-2009-1385",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2009-05-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "502981"
}
],
"notes": [
{
"category": "description",
"text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: e1000_clean_rx_irq() denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1385"
},
{
"category": "external",
"summary": "RHBZ#502981",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
}
],
"release_date": "2007-04-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: e1000_clean_rx_irq() denial of service"
},
{
"cve": "CVE-2009-1388",
"discovery_date": "2009-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504263"
}
],
"notes": [
{
"category": "description",
"text": "The ptrace_start function in kernel/ptrace.c in the Linux kernel 2.6.18 does not properly handle simultaneous execution of the do_coredump function, which allows local users to cause a denial of service (deadlock) via vectors involving the ptrace system call and a coredumping thread.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: do_coredump() vs ptrace_start() deadlock",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1388"
},
{
"category": "external",
"summary": "RHBZ#504263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504263"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1388",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1388"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1388",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1388"
}
],
"release_date": "2009-07-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: do_coredump() vs ptrace_start() deadlock"
},
{
"cve": "CVE-2009-1389",
"discovery_date": "2009-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504726"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: r8169: fix crash when large packets are received",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1389"
},
{
"category": "external",
"summary": "RHBZ#504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389"
}
],
"release_date": "2009-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: r8169: fix crash when large packets are received"
},
{
"cve": "CVE-2009-1895",
"discovery_date": "2009-06-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511171"
}
],
"notes": [
{
"category": "description",
"text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: personality: fix PER_CLEAR_ON_SETID",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1895"
},
{
"category": "external",
"summary": "RHBZ#511171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
}
],
"release_date": "2009-06-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: personality: fix PER_CLEAR_ON_SETID"
},
{
"acknowledgments": [
{
"names": [
"Ramon de C. Valle"
]
}
],
"cve": "CVE-2009-2406",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2009-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512861"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ecryptfs stack overflow in parse_tag_11_packet()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG did not include support for eCryptfs, and therefore are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2406"
},
{
"category": "external",
"summary": "RHBZ#512861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512861"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2406",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2406"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2406",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2406"
}
],
"release_date": "2009-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: ecryptfs stack overflow in parse_tag_11_packet()"
},
{
"acknowledgments": [
{
"names": [
"Ramon de C. Valle"
]
}
],
"cve": "CVE-2009-2407",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2009-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512885"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ecryptfs heap overflow in parse_tag_3_packet()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG did not include support for eCryptfs, and therefore are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2407"
},
{
"category": "external",
"summary": "RHBZ#512885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512885"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2407"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2407",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2407"
}
],
"release_date": "2009-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: ecryptfs heap overflow in parse_tag_3_packet()"
}
]
}
RHSA-2009_1457
Vulnerability from csaf_redhat - Published: 2009-09-22 14:50 - Updated: 2024-11-22 03:00Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 5.2 Extended Update Support.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than what could be handled. This could lead to a\nremote denial of service or code execution. (CVE-2009-1389, Important)\n\n* Tavis Ormandy and Julien Tinnes of the Google Security Team reported a\nflaw in the SOCKOPS_WRAP macro in the Linux kernel. This macro did not\ninitialize the sendpage operation in the proto_ops structure correctly. A\nlocal, unprivileged user could use this flaw to cause a local denial of\nservice or escalate their privileges. (CVE-2009-2692, Important)\n\n* Tavis Ormandy and Julien Tinnes of the Google Security Team reported a\nflaw in the udp_sendmsg() implementation in the Linux kernel when using the\nMSG_MORE flag on UDP sockets. A local, unprivileged user could use this\nflaw to cause a local denial of service or escalate their privileges.\n(CVE-2009-2698, Important)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1457",
"url": "https://access.redhat.com/errata/RHSA-2009:1457"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "516949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516949"
},
{
"category": "external",
"summary": "518034",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=518034"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1457.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-22T03:00:53+00:00",
"generator": {
"date": "2024-11-22T03:00:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2009:1457",
"initial_release_date": "2009-09-22T14:50:00+00:00",
"revision_history": [
{
"date": "2009-09-22T14:50:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-09-22T10:56:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T03:00:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product": {
"name": "Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:5.2"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-devel-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-xen-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-debug-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.28.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.28.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.i386",
"product_id": "kernel-headers-0:2.6.18-92.1.28.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.28.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.28.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.28.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.28.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.28.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.28.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.28.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.28.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.28.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.28.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.28.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.28.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.28.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.28.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.28.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.28.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.28.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.28.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.28.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.28.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.28.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.28.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.28.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"product_id": "kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.28.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.28.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.28.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.28.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.28.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.28.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.28.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.28.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.28.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.28.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.28.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.28.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.28.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.28.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.28.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.28.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.28.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.28.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.28.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.28.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.28.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.28.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.28.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-92.1.28.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.28.el5.src",
"product": {
"name": "kernel-0:2.6.18-92.1.28.el5.src",
"product_id": "kernel-0:2.6.18-92.1.28.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.28.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.28.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src"
},
"product_reference": "kernel-0:2.6.18-92.1.28.el5.src",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-92.1.28.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.28.el5.i386",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-1389",
"discovery_date": "2009-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504726"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: r8169: fix crash when large packets are received",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1389"
},
{
"category": "external",
"summary": "RHBZ#504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389"
}
],
"release_date": "2009-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-22T14:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1457"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: r8169: fix crash when large packets are received"
},
{
"acknowledgments": [
{
"names": [
"Tavis Ormandy"
]
},
{
"names": [
"Julien Tinnes"
],
"organization": "Google Security Team"
}
],
"cve": "CVE-2009-2692",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2009-08-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516949"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: uninit op in SOCKOPS_WRAP() leads to privesc",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue. Please see https://access.redhat.com/articles/18053.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2692"
},
{
"category": "external",
"summary": "RHBZ#516949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2692"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2692",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2692"
}
],
"release_date": "2009-08-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-22T14:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1457"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: uninit op in SOCKOPS_WRAP() leads to privesc"
},
{
"acknowledgments": [
{
"names": [
"Tavis Ormandy"
]
},
{
"names": [
"Julien Tinnes"
],
"organization": "Google Security Team"
}
],
"cve": "CVE-2009-2698",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2009-08-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "518034"
}
],
"notes": [
{
"category": "description",
"text": "The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: udp socket NULL ptr dereference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise MRG.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2698"
},
{
"category": "external",
"summary": "RHBZ#518034",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=518034"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2698",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2698"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2698",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2698"
}
],
"release_date": "2009-08-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-22T14:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1457"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: udp socket NULL ptr dereference"
}
]
}
RHSA-2009_1157
Vulnerability from csaf_redhat - Published: 2009-07-14 19:11 - Updated: 2024-11-22 03:12Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
The inode double locking code in fs/ocfs2/file.c in the Linux kernel 2.6.30 before 2.6.30-rc3, 2.6.27 before 2.6.27.24, 2.6.29 before 2.6.29.4, and possibly other versions down to 2.6.19 allows local users to cause a denial of service (prevention of file creation and removal) via a series of splice system calls that trigger a deadlock between the generic_file_splice_write, splice_from_pipe, and ocfs2_file_splice_write functions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel-rt packages that fix several security issues and various\nbugs are now available for Red Hat Enterprise MRG 1.1.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* a flaw was found in the Intel PRO/1000 network driver in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than what could be handled. This could lead to a\nremote denial of service or code execution. (CVE-2009-1389, Important)\n\n* several flaws were found in the way the Linux kernel CIFS implementation\nhandles Unicode strings. CIFS clients convert Unicode strings sent by a\nserver to their local character sets, and then write those strings into\nmemory. If a malicious server sent a long enough string, it could write\npast the end of the target memory region and corrupt other memory areas,\npossibly leading to a denial of service or privilege escalation on the\nclient mounting the CIFS share. (CVE-2009-1633, Important)\n\n* Frank Filz reported the NFSv4 client was missing a file permission check\nfor the execute bit in some situations. This could allow local,\nunprivileged users to run non-executable files on NFSv4 mounted file\nsystems. (CVE-2009-1630, Moderate)\n\n* a deadlock flaw was found in the Linux kernel splice implementation. This\ndeadlock could occur during interactions between the\ngeneric_file_splice_write() and splice_from_pipe() functions, possibly\nleading to a partial denial of service on the file system partition where\nthe deadlock occurs. (CVE-2009-1961, Moderate)\n\nBug fixes:\n\n* a stack buffer used by get_event_name() was not large enough to\naccommodate the nul terminator that sprintf() writes. In some cases, this\ncould lead to an invalid pointer or a kernel panic. With this update, the\nfunction is modified to allow space for the nul terminator. (BZ#503902)\n\n* free_bootmem() was hard-coded to use node 0. This could have caused a\nkernel panic during boot on a NUMA system that happens to boot on a node\nother than node 0. With this update, free_bootmem() acts on the current\nnode, resolving this issue. (BZ#503048)\n\n* CPU flag mishandling caused TSC clocksource synchronization to fail (TSC\nwas marked unstable) on the Intel\u00ae microarchitecture (Nehalem). In\naddition, TSC clocksource checks added to the 64-bit kernel code are now\npresent for i386 systems. Also, \"/proc/cpuinfo\" now shows TSC-related\nflags. (BZ#50289, BZ#508756)\n\n* barriers are used to make sure delayed work requested from threads is\nprocessed before continuing. run_workqueue(), however, exited before\nprocessing all barriers, causing threads to wait forever. In a reported\ncase, this bug caused missing path issues for Device Mapper Multipathing.\n(BZ#504133)\n\n* calling pipe() with an invalid address caused a file descriptor leak.\n(BZ#509629)\n\n* the code to add \"/dev/rtc\" contained a printk statement without a log\nlevel prefix. (BZ#510099)\n\n* an extra check has been added to the realtime kernel to avoid a rare\ncorruption of the FPU (Floating Point Unit) stack, which could occur if a\ntask using FPU registers was preempted by an interruption. (BZ#509359)\n\n* fix a boot-up problem on HP ProLiant SL2x170z G6 and similar systems by\nadding Intel ICH10 controllers back to the ata_piix driver. (BZ#508783)\n\n* converts a UID comparison in AGP to a more secure capability check. By\ndefault, \"/dev/agpgart\" is accessible only to the root user. (BZ#505493)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1157",
"url": "https://access.redhat.com/errata/RHSA-2009:1157"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "496572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572"
},
{
"category": "external",
"summary": "500297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297"
},
{
"category": "external",
"summary": "502893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=502893"
},
{
"category": "external",
"summary": "502981",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
},
{
"category": "external",
"summary": "503048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503048"
},
{
"category": "external",
"summary": "503474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503474"
},
{
"category": "external",
"summary": "503902",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503902"
},
{
"category": "external",
"summary": "504133",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504133"
},
{
"category": "external",
"summary": "504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "505493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=505493"
},
{
"category": "external",
"summary": "509629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509629"
},
{
"category": "external",
"summary": "510099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510099"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1157.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T03:12:59+00:00",
"generator": {
"date": "2024-11-22T03:12:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2009:1157",
"initial_release_date": "2009-07-14T19:11:00+00:00",
"revision_history": [
{
"date": "2009-07-14T19:11:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-07-14T15:11:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T03:12:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "MRG Realtime for RHEL 5 Server",
"product": {
"name": "MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:1::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-5"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-126.el5rt?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-126.el5rt?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"product": {
"name": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"product_id": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-126.el5rt?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:2.6.24.7-126.el5rt.src",
"product": {
"name": "kernel-rt-0:2.6.24.7-126.el5rt.src",
"product_id": "kernel-rt-0:2.6.24.7-126.el5rt.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-126.el5rt?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:2.6.24.7-126.el5rt.src as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src"
},
"product_reference": "kernel-rt-0:2.6.24.7-126.el5rt.src",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch"
},
"product_reference": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-1385",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2009-05-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "502981"
}
],
"notes": [
{
"category": "description",
"text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: e1000_clean_rx_irq() denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1385"
},
{
"category": "external",
"summary": "RHBZ#502981",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
}
],
"release_date": "2007-04-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-14T19:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1157"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: e1000_clean_rx_irq() denial of service"
},
{
"cve": "CVE-2009-1389",
"discovery_date": "2009-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504726"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: r8169: fix crash when large packets are received",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1389"
},
{
"category": "external",
"summary": "RHBZ#504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389"
}
],
"release_date": "2009-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-14T19:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1157"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: r8169: fix crash when large packets are received"
},
{
"cve": "CVE-2009-1630",
"discovery_date": "2009-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "500297"
}
],
"notes": [
{
"category": "description",
"text": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1630"
},
{
"category": "external",
"summary": "RHBZ#500297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1630",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1630"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630"
}
],
"release_date": "2009-05-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-14T19:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1157"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission"
},
{
"cve": "CVE-2009-1633",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2009-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "496572"
}
],
"notes": [
{
"category": "description",
"text": "Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1633"
},
{
"category": "external",
"summary": "RHBZ#496572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1633",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1633"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633"
}
],
"release_date": "2009-04-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-14T19:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1157"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server"
},
{
"cve": "CVE-2009-1961",
"discovery_date": "2009-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "503474"
}
],
"notes": [
{
"category": "description",
"text": "The inode double locking code in fs/ocfs2/file.c in the Linux kernel 2.6.30 before 2.6.30-rc3, 2.6.27 before 2.6.27.24, 2.6.29 before 2.6.29.4, and possibly other versions down to 2.6.19 allows local users to cause a denial of service (prevention of file creation and removal) via a series of splice system calls that trigger a deadlock between the generic_file_splice_write, splice_from_pipe, and ocfs2_file_splice_write functions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: splice local denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise Linux MRG 2.\n\nThis issue was fixed in Red Hat Enterprise Linux MRG 1 via https://rhn.redhat.com/errata/RHSA-2009-1157.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1961"
},
{
"category": "external",
"summary": "RHBZ#503474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503474"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1961",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1961"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1961",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1961"
}
],
"release_date": "2009-04-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-14T19:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1157"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: splice local denial of service"
}
]
}
RHSA-2009_1469
Vulnerability from csaf_redhat - Published: 2009-09-30 14:54 - Updated: 2024-11-22 03:00Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 4.7 Extended Update Support.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than what could be handled. This could lead to a\nremote denial of service or code execution. (CVE-2009-1389, Important)\n\n* Tavis Ormandy and Julien Tinnes of the Google Security Team reported a\nflaw in the SOCKOPS_WRAP macro in the Linux kernel. This macro did not\ninitialize the sendpage operation in the proto_ops structure correctly. A\nlocal, unprivileged user could use this flaw to cause a local denial of\nservice or escalate their privileges. (CVE-2009-2692, Important)\n\n* Tavis Ormandy and Julien Tinnes of the Google Security Team reported a\nflaw in the udp_sendmsg() implementation in the Linux kernel when using the\nMSG_MORE flag on UDP sockets. A local, unprivileged user could use this\nflaw to cause a local denial of service or escalate their privileges.\n(CVE-2009-2698, Important)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1469",
"url": "https://access.redhat.com/errata/RHSA-2009:1469"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "516949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516949"
},
{
"category": "external",
"summary": "518034",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=518034"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1469.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-22T03:00:56+00:00",
"generator": {
"date": "2024-11-22T03:00:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2009:1469",
"initial_release_date": "2009-09-30T14:54:00+00:00",
"revision_history": [
{
"date": "2009-09-30T14:54:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-09-30T10:58:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T03:00:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product": {
"name": "Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:4.7::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product": {
"name": "Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:4.7::es"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"product": {
"name": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"product_id": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-78.0.27.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"product": {
"name": "kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"product_id": "kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-78.0.27.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-0:2.6.9-78.0.27.EL.i686",
"product": {
"name": "kernel-smp-0:2.6.9-78.0.27.EL.i686",
"product_id": "kernel-smp-0:2.6.9-78.0.27.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp@2.6.9-78.0.27.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"product": {
"name": "kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"product_id": "kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-78.0.27.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-78.0.27.EL.i686",
"product": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.i686",
"product_id": "kernel-devel-0:2.6.9-78.0.27.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.27.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-78.0.27.EL.i686",
"product": {
"name": "kernel-0:2.6.9-78.0.27.EL.i686",
"product_id": "kernel-0:2.6.9-78.0.27.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.27.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"product_id": "kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.27.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"product": {
"name": "kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"product_id": "kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-78.0.27.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"product": {
"name": "kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"product_id": "kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-78.0.27.EL?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"product": {
"name": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"product_id": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-78.0.27.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"product_id": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.27.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"product": {
"name": "kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"product_id": "kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp@2.6.9-78.0.27.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"product": {
"name": "kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"product_id": "kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-78.0.27.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"product": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"product_id": "kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.27.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-78.0.27.EL.x86_64",
"product": {
"name": "kernel-0:2.6.9-78.0.27.EL.x86_64",
"product_id": "kernel-0:2.6.9-78.0.27.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.27.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"product": {
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"product_id": "kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.27.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"product_id": "kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.27.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"product": {
"name": "kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"product_id": "kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-78.0.27.EL?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"product_id": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.27.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"product": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"product_id": "kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.27.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-78.0.27.EL.ia64",
"product": {
"name": "kernel-0:2.6.9-78.0.27.EL.ia64",
"product_id": "kernel-0:2.6.9-78.0.27.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.27.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"product": {
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"product_id": "kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.27.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"product_id": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.27.EL?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"product": {
"name": "kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"product_id": "kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.9-78.0.27.EL?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-78.0.27.EL.src",
"product": {
"name": "kernel-0:2.6.9-78.0.27.EL.src",
"product_id": "kernel-0:2.6.9-78.0.27.EL.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.27.EL?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"product_id": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.27.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"product": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"product_id": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.27.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-78.0.27.EL.ppc64",
"product": {
"name": "kernel-0:2.6.9-78.0.27.EL.ppc64",
"product_id": "kernel-0:2.6.9-78.0.27.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.27.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"product": {
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"product_id": "kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.27.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"product_id": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.27.EL?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"product": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"product_id": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.27.EL?arch=ppc64iseries"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"product": {
"name": "kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"product_id": "kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.27.EL?arch=ppc64iseries"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"product": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"product_id": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.27.EL?arch=ppc64iseries"
}
}
}
],
"category": "architecture",
"name": "ppc64iseries"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"product": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"product_id": "kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.27.EL?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-78.0.27.EL.s390x",
"product": {
"name": "kernel-0:2.6.9-78.0.27.EL.s390x",
"product_id": "kernel-0:2.6.9-78.0.27.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.27.EL?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"product_id": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.27.EL?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-78.0.27.EL.s390",
"product": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.s390",
"product_id": "kernel-devel-0:2.6.9-78.0.27.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.27.EL?arch=s390"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-78.0.27.EL.s390",
"product": {
"name": "kernel-0:2.6.9-78.0.27.EL.s390",
"product_id": "kernel-0:2.6.9-78.0.27.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.27.EL?arch=s390"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"product": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"product_id": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.27.EL?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.ia64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.ppc64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.s390",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.s390x",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.src as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.src",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.s390",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-78.0.27.EL.noarch as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.ia64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.ppc64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.s390",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.s390x",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.src as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.src",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.s390",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-78.0.27.EL.noarch as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-1389",
"discovery_date": "2009-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504726"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: r8169: fix crash when large packets are received",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1389"
},
{
"category": "external",
"summary": "RHBZ#504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389"
}
],
"release_date": "2009-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-30T14:54:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1469"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: r8169: fix crash when large packets are received"
},
{
"acknowledgments": [
{
"names": [
"Tavis Ormandy"
]
},
{
"names": [
"Julien Tinnes"
],
"organization": "Google Security Team"
}
],
"cve": "CVE-2009-2692",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2009-08-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516949"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: uninit op in SOCKOPS_WRAP() leads to privesc",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue. Please see https://access.redhat.com/articles/18053.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2692"
},
{
"category": "external",
"summary": "RHBZ#516949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2692"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2692",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2692"
}
],
"release_date": "2009-08-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-30T14:54:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1469"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: uninit op in SOCKOPS_WRAP() leads to privesc"
},
{
"acknowledgments": [
{
"names": [
"Tavis Ormandy"
]
},
{
"names": [
"Julien Tinnes"
],
"organization": "Google Security Team"
}
],
"cve": "CVE-2009-2698",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2009-08-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "518034"
}
],
"notes": [
{
"category": "description",
"text": "The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: udp socket NULL ptr dereference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise MRG.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2698"
},
{
"category": "external",
"summary": "RHBZ#518034",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=518034"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2698",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2698"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2698",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2698"
}
],
"release_date": "2009-08-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-30T14:54:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1469"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: udp socket NULL ptr dereference"
}
]
}
RHSA-2009:1469
Vulnerability from csaf_redhat - Published: 2009-09-30 14:54 - Updated: 2025-11-21 17:35Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 4.7 Extended Update Support.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than what could be handled. This could lead to a\nremote denial of service or code execution. (CVE-2009-1389, Important)\n\n* Tavis Ormandy and Julien Tinnes of the Google Security Team reported a\nflaw in the SOCKOPS_WRAP macro in the Linux kernel. This macro did not\ninitialize the sendpage operation in the proto_ops structure correctly. A\nlocal, unprivileged user could use this flaw to cause a local denial of\nservice or escalate their privileges. (CVE-2009-2692, Important)\n\n* Tavis Ormandy and Julien Tinnes of the Google Security Team reported a\nflaw in the udp_sendmsg() implementation in the Linux kernel when using the\nMSG_MORE flag on UDP sockets. A local, unprivileged user could use this\nflaw to cause a local denial of service or escalate their privileges.\n(CVE-2009-2698, Important)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1469",
"url": "https://access.redhat.com/errata/RHSA-2009:1469"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "516949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516949"
},
{
"category": "external",
"summary": "518034",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=518034"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1469.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T17:35:16+00:00",
"generator": {
"date": "2025-11-21T17:35:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1469",
"initial_release_date": "2009-09-30T14:54:00+00:00",
"revision_history": [
{
"date": "2009-09-30T14:54:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-09-30T10:58:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:35:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product": {
"name": "Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:4.7::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product": {
"name": "Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:4.7::es"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"product": {
"name": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"product_id": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-78.0.27.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"product": {
"name": "kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"product_id": "kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-78.0.27.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-0:2.6.9-78.0.27.EL.i686",
"product": {
"name": "kernel-smp-0:2.6.9-78.0.27.EL.i686",
"product_id": "kernel-smp-0:2.6.9-78.0.27.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp@2.6.9-78.0.27.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"product": {
"name": "kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"product_id": "kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-78.0.27.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-78.0.27.EL.i686",
"product": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.i686",
"product_id": "kernel-devel-0:2.6.9-78.0.27.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.27.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-78.0.27.EL.i686",
"product": {
"name": "kernel-0:2.6.9-78.0.27.EL.i686",
"product_id": "kernel-0:2.6.9-78.0.27.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.27.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"product_id": "kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.27.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"product": {
"name": "kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"product_id": "kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-78.0.27.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"product": {
"name": "kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"product_id": "kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-78.0.27.EL?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"product": {
"name": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"product_id": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-78.0.27.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"product_id": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.27.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"product": {
"name": "kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"product_id": "kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp@2.6.9-78.0.27.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"product": {
"name": "kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"product_id": "kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-78.0.27.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"product": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"product_id": "kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.27.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-78.0.27.EL.x86_64",
"product": {
"name": "kernel-0:2.6.9-78.0.27.EL.x86_64",
"product_id": "kernel-0:2.6.9-78.0.27.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.27.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"product": {
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"product_id": "kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.27.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"product_id": "kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.27.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"product": {
"name": "kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"product_id": "kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-78.0.27.EL?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"product_id": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.27.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"product": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"product_id": "kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.27.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-78.0.27.EL.ia64",
"product": {
"name": "kernel-0:2.6.9-78.0.27.EL.ia64",
"product_id": "kernel-0:2.6.9-78.0.27.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.27.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"product": {
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"product_id": "kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.27.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"product_id": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.27.EL?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"product": {
"name": "kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"product_id": "kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.9-78.0.27.EL?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-78.0.27.EL.src",
"product": {
"name": "kernel-0:2.6.9-78.0.27.EL.src",
"product_id": "kernel-0:2.6.9-78.0.27.EL.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.27.EL?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"product_id": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.27.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"product": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"product_id": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.27.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-78.0.27.EL.ppc64",
"product": {
"name": "kernel-0:2.6.9-78.0.27.EL.ppc64",
"product_id": "kernel-0:2.6.9-78.0.27.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.27.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"product": {
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"product_id": "kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.27.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"product_id": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.27.EL?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"product": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"product_id": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.27.EL?arch=ppc64iseries"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"product": {
"name": "kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"product_id": "kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.27.EL?arch=ppc64iseries"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"product": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"product_id": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.27.EL?arch=ppc64iseries"
}
}
}
],
"category": "architecture",
"name": "ppc64iseries"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"product": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"product_id": "kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.27.EL?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-78.0.27.EL.s390x",
"product": {
"name": "kernel-0:2.6.9-78.0.27.EL.s390x",
"product_id": "kernel-0:2.6.9-78.0.27.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.27.EL?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"product_id": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.27.EL?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-78.0.27.EL.s390",
"product": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.s390",
"product_id": "kernel-devel-0:2.6.9-78.0.27.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.27.EL?arch=s390"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-78.0.27.EL.s390",
"product": {
"name": "kernel-0:2.6.9-78.0.27.EL.s390",
"product_id": "kernel-0:2.6.9-78.0.27.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.27.EL?arch=s390"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"product": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"product_id": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.27.EL?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.ia64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.ppc64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.s390",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.s390x",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.src as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.src",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.s390",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-78.0.27.EL.noarch as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.ia64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.ppc64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.s390",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.s390x",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.src as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.src",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.s390",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-78.0.27.EL.noarch as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-1389",
"discovery_date": "2009-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504726"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: r8169: fix crash when large packets are received",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1389"
},
{
"category": "external",
"summary": "RHBZ#504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389"
}
],
"release_date": "2009-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-30T14:54:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1469"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: r8169: fix crash when large packets are received"
},
{
"acknowledgments": [
{
"names": [
"Tavis Ormandy"
]
},
{
"names": [
"Julien Tinnes"
],
"organization": "Google Security Team"
}
],
"cve": "CVE-2009-2692",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2009-08-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516949"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: uninit op in SOCKOPS_WRAP() leads to privesc",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue. Please see https://access.redhat.com/articles/18053.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2692"
},
{
"category": "external",
"summary": "RHBZ#516949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2692"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2692",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2692"
}
],
"release_date": "2009-08-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-30T14:54:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1469"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: uninit op in SOCKOPS_WRAP() leads to privesc"
},
{
"acknowledgments": [
{
"names": [
"Tavis Ormandy"
]
},
{
"names": [
"Julien Tinnes"
],
"organization": "Google Security Team"
}
],
"cve": "CVE-2009-2698",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2009-08-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "518034"
}
],
"notes": [
{
"category": "description",
"text": "The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: udp socket NULL ptr dereference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise MRG.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2698"
},
{
"category": "external",
"summary": "RHBZ#518034",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=518034"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2698",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2698"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2698",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2698"
}
],
"release_date": "2009-08-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-30T14:54:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1469"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4AS-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4AS-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.src",
"4ES-4.7.z:kernel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.ppc64iseries",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.s390x",
"4ES-4.7.z:kernel-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-doc-0:2.6.9-78.0.27.EL.noarch",
"4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ia64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.ppc64",
"4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.27.EL.x86_64",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.i686",
"4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.27.EL.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: udp socket NULL ptr dereference"
}
]
}
RHSA-2009:1211
Vulnerability from csaf_redhat - Published: 2009-08-13 15:30 - Updated: 2025-11-21 17:35Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than what could be handled. This could lead to a\nremote denial of service or code execution. (CVE-2009-1389, Important)\n\n* a buffer overflow flaw was found in the CIFSTCon() function of the Linux\nkernel Common Internet File System (CIFS) implementation. When mounting a\nCIFS share, a malicious server could send an overly-long string to the\nclient, possibly leading to a denial of service or privilege escalation on\nthe client mounting the CIFS share. (CVE-2009-1439, Important)\n\n* several flaws were found in the way the Linux kernel CIFS implementation\nhandles Unicode strings. CIFS clients convert Unicode strings sent by a\nserver to their local character sets, and then write those strings into\nmemory. If a malicious server sent a long enough string, it could write\npast the end of the target memory region and corrupt other memory areas,\npossibly leading to a denial of service or privilege escalation on the\nclient mounting the CIFS share. (CVE-2009-1633, Important)\n\nThese updated packages also fix the following bugs:\n\n* when using network bonding in the \"balance-tlb\" or \"balance-alb\" mode,\nthe primary setting for the primary slave device was lost when said\ndevice was brought down (ifdown). Bringing the slave interface back up\n(ifup) did not restore the primary setting (the device was not made the\nactive slave). (BZ#507563)\n\n* a bug in timer_interrupt() may have caused the system time to move up to\ntwo days or more into the future, or to be delayed for several minutes.\nThis bug only affected Intel 64 and AMD64 systems that have the High\nPrecision Event Timer (HPET) enabled in the BIOS, and could have caused\nproblems for applications that require timing to be accurate. (BZ#508835)\n\n* a race condition was resolved in the Linux kernel block layer between\nshow_partition() and rescan_partitions(). This could have caused a NULL\npointer dereference in show_partition(), leading to a system crash (kernel\npanic). This issue was most likely to occur on systems running monitoring\nsoftware that regularly scanned hard disk partitions, or from repeatedly\nrunning commands that probe for partition information. (BZ#512310)\n\n* previously, the Stratus memory tracker missed certain modified pages.\nWith this update, information about the type of page (small page or\nhuge page) is passed to the Stratus memory tracker, which resolves this\nissue. The fix for this issue does not affect systems that do not use\nmemory tracking. (BZ#513182)\n\n* a bug may have caused a system crash when using the cciss driver, due to\nan uninitialized kernel structure. A reported case of this issue occurred\nafter issuing consecutive SCSI TUR commands (sg_turs sends SCSI\ntest-unit-ready commands in a loop). (BZ#513189)\n\n* a bug in the SCSI implementation caused \"Aborted Command - internal\ntarget failure\" errors to be sent to Device-Mapper Multipath, without\nretries, resulting in Device-Mapper Multipath marking the path as failed\nand making a path group switch. With this update, all errors that return a\nsense key in the SCSI mid layer (including \"Aborted Command - internal\ntarget failure\") are retried. (BZ#514007)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1211",
"url": "https://access.redhat.com/errata/RHSA-2009:1211"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "494275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275"
},
{
"category": "external",
"summary": "496572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572"
},
{
"category": "external",
"summary": "504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "507563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=507563"
},
{
"category": "external",
"summary": "508835",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=508835"
},
{
"category": "external",
"summary": "512310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512310"
},
{
"category": "external",
"summary": "513182",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513182"
},
{
"category": "external",
"summary": "513189",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513189"
},
{
"category": "external",
"summary": "514007",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=514007"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1211.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:35:03+00:00",
"generator": {
"date": "2025-11-21T17:35:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1211",
"initial_release_date": "2009-08-13T15:30:00+00:00",
"revision_history": [
{
"date": "2009-08-13T15:30:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-08-13T11:34:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:35:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-89.0.7.EL.i686",
"product": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.i686",
"product_id": "kernel-devel-0:2.6.9-89.0.7.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"product": {
"name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"product_id": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.0.7.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"product": {
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"product_id": "kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.7.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.0.7.EL.i686",
"product": {
"name": "kernel-0:2.6.9-89.0.7.EL.i686",
"product_id": "kernel-0:2.6.9-89.0.7.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"product": {
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"product_id": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.7.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"product": {
"name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"product_id": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.0.7.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-0:2.6.9-89.0.7.EL.i686",
"product": {
"name": "kernel-smp-0:2.6.9-89.0.7.EL.i686",
"product_id": "kernel-smp-0:2.6.9-89.0.7.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.7.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"product": {
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"product_id": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.7.EL?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"product": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"product_id": "kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"product_id": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.7.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.0.7.EL.ia64",
"product": {
"name": "kernel-0:2.6.9-89.0.7.EL.ia64",
"product_id": "kernel-0:2.6.9-89.0.7.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"product": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"product_id": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.7.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"product": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"product_id": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"product_id": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.7.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"product": {
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"product_id": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.7.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.0.7.EL.x86_64",
"product": {
"name": "kernel-0:2.6.9-89.0.7.EL.x86_64",
"product_id": "kernel-0:2.6.9-89.0.7.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"product": {
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"product_id": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.7.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"product": {
"name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"product_id": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.7.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"product": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"product_id": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.7.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"product": {
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"product_id": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.7.EL?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"product": {
"name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"product_id": "kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.0.7.EL?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.0.7.EL.src",
"product": {
"name": "kernel-0:2.6.9-89.0.7.EL.src",
"product_id": "kernel-0:2.6.9-89.0.7.EL.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"product": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"product_id": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"product_id": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.7.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64",
"product": {
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64",
"product_id": "kernel-0:2.6.9-89.0.7.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"product": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"product_id": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.7.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"product": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"product_id": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=ppc64iseries"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"product": {
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"product_id": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=ppc64iseries"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"product": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=ppc64iseries"
}
}
}
],
"category": "architecture",
"name": "ppc64iseries"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"product": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"product_id": "kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.0.7.EL.s390x",
"product": {
"name": "kernel-0:2.6.9-89.0.7.EL.s390x",
"product_id": "kernel-0:2.6.9-89.0.7.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390",
"product": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390",
"product_id": "kernel-devel-0:2.6.9-89.0.7.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=s390"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.0.7.EL.s390",
"product": {
"name": "kernel-0:2.6.9-89.0.7.EL.s390",
"product_id": "kernel-0:2.6.9-89.0.7.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=s390"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"product": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.src"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.src"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.src"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.src"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-1389",
"discovery_date": "2009-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504726"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: r8169: fix crash when large packets are received",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-0:2.6.9-89.0.7.EL.src",
"4AS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.src",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-0:2.6.9-89.0.7.EL.src",
"4ES:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-0:2.6.9-89.0.7.EL.src",
"4WS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1389"
},
{
"category": "external",
"summary": "RHBZ#504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389"
}
],
"release_date": "2009-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-13T15:30:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:kernel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-0:2.6.9-89.0.7.EL.src",
"4AS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.src",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-0:2.6.9-89.0.7.EL.src",
"4ES:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-0:2.6.9-89.0.7.EL.src",
"4WS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1211"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"4AS:kernel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-0:2.6.9-89.0.7.EL.src",
"4AS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.src",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-0:2.6.9-89.0.7.EL.src",
"4ES:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-0:2.6.9-89.0.7.EL.src",
"4WS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: r8169: fix crash when large packets are received"
},
{
"cve": "CVE-2009-1439",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2009-04-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "494275"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-0:2.6.9-89.0.7.EL.src",
"4AS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.src",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-0:2.6.9-89.0.7.EL.src",
"4ES:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-0:2.6.9-89.0.7.EL.src",
"4WS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1439"
},
{
"category": "external",
"summary": "RHBZ#494275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1439",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1439"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439"
}
],
"release_date": "2009-03-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-13T15:30:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:kernel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-0:2.6.9-89.0.7.EL.src",
"4AS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.src",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-0:2.6.9-89.0.7.EL.src",
"4ES:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-0:2.6.9-89.0.7.EL.src",
"4WS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1211"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"4AS:kernel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-0:2.6.9-89.0.7.EL.src",
"4AS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.src",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-0:2.6.9-89.0.7.EL.src",
"4ES:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-0:2.6.9-89.0.7.EL.src",
"4WS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount"
},
{
"cve": "CVE-2009-1633",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2009-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "496572"
}
],
"notes": [
{
"category": "description",
"text": "Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-0:2.6.9-89.0.7.EL.src",
"4AS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.src",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-0:2.6.9-89.0.7.EL.src",
"4ES:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-0:2.6.9-89.0.7.EL.src",
"4WS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1633"
},
{
"category": "external",
"summary": "RHBZ#496572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1633",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1633"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633"
}
],
"release_date": "2009-04-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-13T15:30:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:kernel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-0:2.6.9-89.0.7.EL.src",
"4AS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.src",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-0:2.6.9-89.0.7.EL.src",
"4ES:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-0:2.6.9-89.0.7.EL.src",
"4WS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1211"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"4AS:kernel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-0:2.6.9-89.0.7.EL.src",
"4AS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.src",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-0:2.6.9-89.0.7.EL.src",
"4ES:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-0:2.6.9-89.0.7.EL.src",
"4WS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server"
}
]
}
RHSA-2009_1193
Vulnerability from csaf_redhat - Published: 2009-08-04 13:10 - Updated: 2024-11-22 03:13Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
The ptrace_start function in kernel/ptrace.c in the Linux kernel 2.6.18 does not properly handle simultaneous execution of the do_coredump function, which allows local users to cause a denial of service (deadlock) via vectors involving the ptrace system call and a coredumping thread.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* the possibility of a timeout value overflow was found in the Linux kernel\nhigh-resolution timers functionality, hrtimers. This could allow a local,\nunprivileged user to execute arbitrary code, or cause a denial of service\n(kernel panic). (CVE-2007-5966, Important)\n\n* a flaw was found in the Intel PRO/1000 network driver in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than could be handled, which could lead to a remote\ndenial of service or code execution. (CVE-2009-1389, Important)\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* Ramon de Carvalho Valle reported two flaws in the Linux kernel eCryptfs\nimplementation. A local attacker with permissions to perform an eCryptfs\nmount could modify the metadata of the files in that eCrypfts mount to\ncause a buffer overflow, leading to a denial of service or privilege\nescalation. (CVE-2009-2406, CVE-2009-2407, Important)\n\n* Konstantin Khlebnikov discovered a race condition in the ptrace\nimplementation in the Linux kernel. This race condition can occur when the\nprocess tracing and the process being traced participate in a core dump. A\nlocal, unprivileged user could use this flaw to trigger a deadlock,\nresulting in a partial denial of service. (CVE-2009-1388, Moderate)\n\nBug fixes (see References below for a link to more detailed notes):\n\n* possible dom0 crash when a Xen para-virtualized guest was installed while\nanother para-virtualized guest was rebooting. (BZ#497812)\n\n* no directory removal audit record if the directory and its subtree were\nrecursively watched by an audit rule. (BZ#507561)\n\n* running \"echo 1 \u003e /proc/sys/vm/drop_caches\" under high memory load could\ncause a kernel panic. (BZ#503692)\n\n* on 32-bit systems, core dumps for some multithreaded applications did not\ninclude all thread information. (BZ#505322)\n\n* a stack buffer used by get_event_name() was too small for nul terminator\nsprintf() writes. This could lead to an invalid pointer or kernel panic.\n(BZ#506906)\n\n* when using the aic94xx driver, systems with SATA drives may not boot due\nto a libsas bug. (BZ#506029)\n\n* Wacom Cintiq 21UX and Intuos stylus buttons were handled incorrectly when\nmoved away from and back to these tablets. (BZ#508275)\n\n* CPU \"soft lockup\" messages and possibe system hangs on systems with\ncertain Broadcom network devices and running the Linux kernel from the\nkernel-xen package. (BZ#503689)\n\n* on 64-bit PowerPC, getitimer() failed for programs using the ITIMER_REAL\ntimer that were also compiled for 64-bit systems. This caused such programs\nto abort. (BZ#510018)\n\n* write operations could be blocked even when using O_NONBLOCK. (BZ#510239)\n\n* the \"pci=nomsi\" option was required for installing and booting Red Hat\nEnterprise Linux 5.2 on systems with VIA VT3364 chipsets. (BZ#507529)\n\n* shutting down, destroying, or migrating Xen guests with large amounts of\nmemory could cause other guests to be temporarily unresponsive. (BZ#512311)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. Systems must be rebooted for this update\nto take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1193",
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.4/html/Technical_Notes/kernel.html#RHSA-2009-1193",
"url": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.4/html/Technical_Notes/kernel.html#RHSA-2009-1193"
},
{
"category": "external",
"summary": "453135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
},
{
"category": "external",
"summary": "497812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=497812"
},
{
"category": "external",
"summary": "502981",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
},
{
"category": "external",
"summary": "503689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503689"
},
{
"category": "external",
"summary": "503692",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503692"
},
{
"category": "external",
"summary": "504263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504263"
},
{
"category": "external",
"summary": "504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "505322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=505322"
},
{
"category": "external",
"summary": "506029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=506029"
},
{
"category": "external",
"summary": "506906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=506906"
},
{
"category": "external",
"summary": "507529",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=507529"
},
{
"category": "external",
"summary": "507561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=507561"
},
{
"category": "external",
"summary": "508275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=508275"
},
{
"category": "external",
"summary": "510018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510018"
},
{
"category": "external",
"summary": "510239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510239"
},
{
"category": "external",
"summary": "511171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
},
{
"category": "external",
"summary": "512311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512311"
},
{
"category": "external",
"summary": "512861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512861"
},
{
"category": "external",
"summary": "512885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512885"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1193.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T03:13:04+00:00",
"generator": {
"date": "2024-11-22T03:13:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2009:1193",
"initial_release_date": "2009-08-04T13:10:00+00:00",
"revision_history": [
{
"date": "2009-08-04T13:10:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-08-04T09:15:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T03:13:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product": {
"name": "Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:5.3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.4.1.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.src",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.src",
"product_id": "kernel-0:2.6.18-128.4.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.4.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-128.4.1.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.4.1.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.src",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5966",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2007-12-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "453135"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: non-root can trigger cpu_idle soft lockup",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and 4.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5966"
},
{
"category": "external",
"summary": "RHBZ#453135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5966",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966"
}
],
"release_date": "2007-12-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: non-root can trigger cpu_idle soft lockup"
},
{
"cve": "CVE-2009-1385",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2009-05-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "502981"
}
],
"notes": [
{
"category": "description",
"text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: e1000_clean_rx_irq() denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1385"
},
{
"category": "external",
"summary": "RHBZ#502981",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
}
],
"release_date": "2007-04-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: e1000_clean_rx_irq() denial of service"
},
{
"cve": "CVE-2009-1388",
"discovery_date": "2009-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504263"
}
],
"notes": [
{
"category": "description",
"text": "The ptrace_start function in kernel/ptrace.c in the Linux kernel 2.6.18 does not properly handle simultaneous execution of the do_coredump function, which allows local users to cause a denial of service (deadlock) via vectors involving the ptrace system call and a coredumping thread.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: do_coredump() vs ptrace_start() deadlock",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1388"
},
{
"category": "external",
"summary": "RHBZ#504263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504263"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1388",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1388"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1388",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1388"
}
],
"release_date": "2009-07-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: do_coredump() vs ptrace_start() deadlock"
},
{
"cve": "CVE-2009-1389",
"discovery_date": "2009-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504726"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: r8169: fix crash when large packets are received",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1389"
},
{
"category": "external",
"summary": "RHBZ#504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389"
}
],
"release_date": "2009-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: r8169: fix crash when large packets are received"
},
{
"cve": "CVE-2009-1895",
"discovery_date": "2009-06-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511171"
}
],
"notes": [
{
"category": "description",
"text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: personality: fix PER_CLEAR_ON_SETID",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1895"
},
{
"category": "external",
"summary": "RHBZ#511171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
}
],
"release_date": "2009-06-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: personality: fix PER_CLEAR_ON_SETID"
},
{
"acknowledgments": [
{
"names": [
"Ramon de C. Valle"
]
}
],
"cve": "CVE-2009-2406",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2009-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512861"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ecryptfs stack overflow in parse_tag_11_packet()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG did not include support for eCryptfs, and therefore are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2406"
},
{
"category": "external",
"summary": "RHBZ#512861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512861"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2406",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2406"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2406",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2406"
}
],
"release_date": "2009-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: ecryptfs stack overflow in parse_tag_11_packet()"
},
{
"acknowledgments": [
{
"names": [
"Ramon de C. Valle"
]
}
],
"cve": "CVE-2009-2407",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2009-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512885"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ecryptfs heap overflow in parse_tag_3_packet()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG did not include support for eCryptfs, and therefore are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2407"
},
{
"category": "external",
"summary": "RHBZ#512885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512885"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2407"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2407",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2407"
}
],
"release_date": "2009-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: ecryptfs heap overflow in parse_tag_3_packet()"
}
]
}
RHSA-2009_1211
Vulnerability from csaf_redhat - Published: 2009-08-13 15:30 - Updated: 2024-11-22 03:00Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than what could be handled. This could lead to a\nremote denial of service or code execution. (CVE-2009-1389, Important)\n\n* a buffer overflow flaw was found in the CIFSTCon() function of the Linux\nkernel Common Internet File System (CIFS) implementation. When mounting a\nCIFS share, a malicious server could send an overly-long string to the\nclient, possibly leading to a denial of service or privilege escalation on\nthe client mounting the CIFS share. (CVE-2009-1439, Important)\n\n* several flaws were found in the way the Linux kernel CIFS implementation\nhandles Unicode strings. CIFS clients convert Unicode strings sent by a\nserver to their local character sets, and then write those strings into\nmemory. If a malicious server sent a long enough string, it could write\npast the end of the target memory region and corrupt other memory areas,\npossibly leading to a denial of service or privilege escalation on the\nclient mounting the CIFS share. (CVE-2009-1633, Important)\n\nThese updated packages also fix the following bugs:\n\n* when using network bonding in the \"balance-tlb\" or \"balance-alb\" mode,\nthe primary setting for the primary slave device was lost when said\ndevice was brought down (ifdown). Bringing the slave interface back up\n(ifup) did not restore the primary setting (the device was not made the\nactive slave). (BZ#507563)\n\n* a bug in timer_interrupt() may have caused the system time to move up to\ntwo days or more into the future, or to be delayed for several minutes.\nThis bug only affected Intel 64 and AMD64 systems that have the High\nPrecision Event Timer (HPET) enabled in the BIOS, and could have caused\nproblems for applications that require timing to be accurate. (BZ#508835)\n\n* a race condition was resolved in the Linux kernel block layer between\nshow_partition() and rescan_partitions(). This could have caused a NULL\npointer dereference in show_partition(), leading to a system crash (kernel\npanic). This issue was most likely to occur on systems running monitoring\nsoftware that regularly scanned hard disk partitions, or from repeatedly\nrunning commands that probe for partition information. (BZ#512310)\n\n* previously, the Stratus memory tracker missed certain modified pages.\nWith this update, information about the type of page (small page or\nhuge page) is passed to the Stratus memory tracker, which resolves this\nissue. The fix for this issue does not affect systems that do not use\nmemory tracking. (BZ#513182)\n\n* a bug may have caused a system crash when using the cciss driver, due to\nan uninitialized kernel structure. A reported case of this issue occurred\nafter issuing consecutive SCSI TUR commands (sg_turs sends SCSI\ntest-unit-ready commands in a loop). (BZ#513189)\n\n* a bug in the SCSI implementation caused \"Aborted Command - internal\ntarget failure\" errors to be sent to Device-Mapper Multipath, without\nretries, resulting in Device-Mapper Multipath marking the path as failed\nand making a path group switch. With this update, all errors that return a\nsense key in the SCSI mid layer (including \"Aborted Command - internal\ntarget failure\") are retried. (BZ#514007)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1211",
"url": "https://access.redhat.com/errata/RHSA-2009:1211"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "494275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275"
},
{
"category": "external",
"summary": "496572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572"
},
{
"category": "external",
"summary": "504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "507563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=507563"
},
{
"category": "external",
"summary": "508835",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=508835"
},
{
"category": "external",
"summary": "512310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512310"
},
{
"category": "external",
"summary": "513182",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513182"
},
{
"category": "external",
"summary": "513189",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513189"
},
{
"category": "external",
"summary": "514007",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=514007"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1211.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T03:00:31+00:00",
"generator": {
"date": "2024-11-22T03:00:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2009:1211",
"initial_release_date": "2009-08-13T15:30:00+00:00",
"revision_history": [
{
"date": "2009-08-13T15:30:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-08-13T11:34:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T03:00:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-89.0.7.EL.i686",
"product": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.i686",
"product_id": "kernel-devel-0:2.6.9-89.0.7.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"product": {
"name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"product_id": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.0.7.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"product": {
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"product_id": "kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.7.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.0.7.EL.i686",
"product": {
"name": "kernel-0:2.6.9-89.0.7.EL.i686",
"product_id": "kernel-0:2.6.9-89.0.7.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"product": {
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"product_id": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.7.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"product": {
"name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"product_id": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.0.7.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-0:2.6.9-89.0.7.EL.i686",
"product": {
"name": "kernel-smp-0:2.6.9-89.0.7.EL.i686",
"product_id": "kernel-smp-0:2.6.9-89.0.7.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.7.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"product": {
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"product_id": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.7.EL?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"product": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"product_id": "kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"product_id": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.7.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.0.7.EL.ia64",
"product": {
"name": "kernel-0:2.6.9-89.0.7.EL.ia64",
"product_id": "kernel-0:2.6.9-89.0.7.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"product": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"product_id": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.7.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"product": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"product_id": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"product_id": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.7.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"product": {
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"product_id": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.7.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.0.7.EL.x86_64",
"product": {
"name": "kernel-0:2.6.9-89.0.7.EL.x86_64",
"product_id": "kernel-0:2.6.9-89.0.7.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"product": {
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"product_id": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.7.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"product": {
"name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"product_id": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.7.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"product": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"product_id": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.7.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"product": {
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"product_id": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.7.EL?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"product": {
"name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"product_id": "kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.0.7.EL?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.0.7.EL.src",
"product": {
"name": "kernel-0:2.6.9-89.0.7.EL.src",
"product_id": "kernel-0:2.6.9-89.0.7.EL.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"product": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"product_id": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"product_id": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.7.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64",
"product": {
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64",
"product_id": "kernel-0:2.6.9-89.0.7.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"product": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"product_id": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.7.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"product": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"product_id": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=ppc64iseries"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"product": {
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"product_id": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=ppc64iseries"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"product": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=ppc64iseries"
}
}
}
],
"category": "architecture",
"name": "ppc64iseries"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"product": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"product_id": "kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.0.7.EL.s390x",
"product": {
"name": "kernel-0:2.6.9-89.0.7.EL.s390x",
"product_id": "kernel-0:2.6.9-89.0.7.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390",
"product": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390",
"product_id": "kernel-devel-0:2.6.9-89.0.7.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=s390"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.0.7.EL.s390",
"product": {
"name": "kernel-0:2.6.9-89.0.7.EL.s390",
"product_id": "kernel-0:2.6.9-89.0.7.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=s390"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"product": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.src"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.src"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.src"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.src"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-1389",
"discovery_date": "2009-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504726"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: r8169: fix crash when large packets are received",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-0:2.6.9-89.0.7.EL.src",
"4AS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.src",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-0:2.6.9-89.0.7.EL.src",
"4ES:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-0:2.6.9-89.0.7.EL.src",
"4WS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1389"
},
{
"category": "external",
"summary": "RHBZ#504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389"
}
],
"release_date": "2009-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-13T15:30:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:kernel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-0:2.6.9-89.0.7.EL.src",
"4AS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.src",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-0:2.6.9-89.0.7.EL.src",
"4ES:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-0:2.6.9-89.0.7.EL.src",
"4WS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1211"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"4AS:kernel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-0:2.6.9-89.0.7.EL.src",
"4AS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.src",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-0:2.6.9-89.0.7.EL.src",
"4ES:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-0:2.6.9-89.0.7.EL.src",
"4WS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: r8169: fix crash when large packets are received"
},
{
"cve": "CVE-2009-1439",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2009-04-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "494275"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-0:2.6.9-89.0.7.EL.src",
"4AS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.src",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-0:2.6.9-89.0.7.EL.src",
"4ES:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-0:2.6.9-89.0.7.EL.src",
"4WS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1439"
},
{
"category": "external",
"summary": "RHBZ#494275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1439",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1439"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439"
}
],
"release_date": "2009-03-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-13T15:30:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:kernel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-0:2.6.9-89.0.7.EL.src",
"4AS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.src",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-0:2.6.9-89.0.7.EL.src",
"4ES:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-0:2.6.9-89.0.7.EL.src",
"4WS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1211"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"4AS:kernel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-0:2.6.9-89.0.7.EL.src",
"4AS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.src",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-0:2.6.9-89.0.7.EL.src",
"4ES:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-0:2.6.9-89.0.7.EL.src",
"4WS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount"
},
{
"cve": "CVE-2009-1633",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2009-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "496572"
}
],
"notes": [
{
"category": "description",
"text": "Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-0:2.6.9-89.0.7.EL.src",
"4AS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.src",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-0:2.6.9-89.0.7.EL.src",
"4ES:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-0:2.6.9-89.0.7.EL.src",
"4WS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1633"
},
{
"category": "external",
"summary": "RHBZ#496572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1633",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1633"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633"
}
],
"release_date": "2009-04-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-13T15:30:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:kernel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-0:2.6.9-89.0.7.EL.src",
"4AS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.src",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-0:2.6.9-89.0.7.EL.src",
"4ES:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-0:2.6.9-89.0.7.EL.src",
"4WS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1211"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"4AS:kernel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-0:2.6.9-89.0.7.EL.src",
"4AS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.src",
"4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-0:2.6.9-89.0.7.EL.src",
"4ES:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-0:2.6.9-89.0.7.EL.src",
"4WS:kernel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server"
}
]
}
RHSA-2009:1457
Vulnerability from csaf_redhat - Published: 2009-09-22 14:50 - Updated: 2025-11-21 17:35Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 5.2 Extended Update Support.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than what could be handled. This could lead to a\nremote denial of service or code execution. (CVE-2009-1389, Important)\n\n* Tavis Ormandy and Julien Tinnes of the Google Security Team reported a\nflaw in the SOCKOPS_WRAP macro in the Linux kernel. This macro did not\ninitialize the sendpage operation in the proto_ops structure correctly. A\nlocal, unprivileged user could use this flaw to cause a local denial of\nservice or escalate their privileges. (CVE-2009-2692, Important)\n\n* Tavis Ormandy and Julien Tinnes of the Google Security Team reported a\nflaw in the udp_sendmsg() implementation in the Linux kernel when using the\nMSG_MORE flag on UDP sockets. A local, unprivileged user could use this\nflaw to cause a local denial of service or escalate their privileges.\n(CVE-2009-2698, Important)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1457",
"url": "https://access.redhat.com/errata/RHSA-2009:1457"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "516949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516949"
},
{
"category": "external",
"summary": "518034",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=518034"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1457.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T17:35:13+00:00",
"generator": {
"date": "2025-11-21T17:35:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1457",
"initial_release_date": "2009-09-22T14:50:00+00:00",
"revision_history": [
{
"date": "2009-09-22T14:50:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-09-22T10:56:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:35:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product": {
"name": "Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:5.2"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-devel-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-xen-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-debug-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-92.1.28.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.28.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.28.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.i386",
"product_id": "kernel-headers-0:2.6.18-92.1.28.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.28.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.28.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.28.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.28.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.28.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.28.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.28.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.28.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.28.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.28.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.28.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.28.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.28.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.28.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.28.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.28.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.28.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.28.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.28.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.28.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.28.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.28.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"product_id": "kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.28.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"product_id": "kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.28.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.28.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.28.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.28.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.28.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.28.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.28.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.28.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.28.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.28.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.28.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"product_id": "kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.28.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.28.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.28.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.28.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.28.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.28.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.28.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.28.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.28.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.28.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.28.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.28.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-92.1.28.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.28.el5.src",
"product": {
"name": "kernel-0:2.6.18-92.1.28.el5.src",
"product_id": "kernel-0:2.6.18-92.1.28.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.28.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.28.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src"
},
"product_reference": "kernel-0:2.6.18-92.1.28.el5.src",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-92.1.28.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.28.el5.i386",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-92.1.28.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-1389",
"discovery_date": "2009-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504726"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: r8169: fix crash when large packets are received",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1389"
},
{
"category": "external",
"summary": "RHBZ#504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389"
}
],
"release_date": "2009-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-22T14:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1457"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: r8169: fix crash when large packets are received"
},
{
"acknowledgments": [
{
"names": [
"Tavis Ormandy"
]
},
{
"names": [
"Julien Tinnes"
],
"organization": "Google Security Team"
}
],
"cve": "CVE-2009-2692",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2009-08-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516949"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: uninit op in SOCKOPS_WRAP() leads to privesc",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue. Please see https://access.redhat.com/articles/18053.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2692"
},
{
"category": "external",
"summary": "RHBZ#516949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2692"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2692",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2692"
}
],
"release_date": "2009-08-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-22T14:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1457"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: uninit op in SOCKOPS_WRAP() leads to privesc"
},
{
"acknowledgments": [
{
"names": [
"Tavis Ormandy"
]
},
{
"names": [
"Julien Tinnes"
],
"organization": "Google Security Team"
}
],
"cve": "CVE-2009-2698",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2009-08-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "518034"
}
],
"notes": [
{
"category": "description",
"text": "The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: udp socket NULL ptr dereference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise MRG.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2698"
},
{
"category": "external",
"summary": "RHBZ#518034",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=518034"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2698",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2698"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2698",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2698"
}
],
"release_date": "2009-08-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-22T14:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1457"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.src",
"5Server-5.2.Z:kernel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.28.el5.noarch",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.i386",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.ppc64",
"5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.28.el5.s390x",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.28.el5.x86_64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.i686",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.ia64",
"5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.28.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: udp socket NULL ptr dereference"
}
]
}
RHSA-2009:1157
Vulnerability from csaf_redhat - Published: 2009-07-14 19:11 - Updated: 2025-11-21 17:34Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
The inode double locking code in fs/ocfs2/file.c in the Linux kernel 2.6.30 before 2.6.30-rc3, 2.6.27 before 2.6.27.24, 2.6.29 before 2.6.29.4, and possibly other versions down to 2.6.19 allows local users to cause a denial of service (prevention of file creation and removal) via a series of splice system calls that trigger a deadlock between the generic_file_splice_write, splice_from_pipe, and ocfs2_file_splice_write functions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel-rt packages that fix several security issues and various\nbugs are now available for Red Hat Enterprise MRG 1.1.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* a flaw was found in the Intel PRO/1000 network driver in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than what could be handled. This could lead to a\nremote denial of service or code execution. (CVE-2009-1389, Important)\n\n* several flaws were found in the way the Linux kernel CIFS implementation\nhandles Unicode strings. CIFS clients convert Unicode strings sent by a\nserver to their local character sets, and then write those strings into\nmemory. If a malicious server sent a long enough string, it could write\npast the end of the target memory region and corrupt other memory areas,\npossibly leading to a denial of service or privilege escalation on the\nclient mounting the CIFS share. (CVE-2009-1633, Important)\n\n* Frank Filz reported the NFSv4 client was missing a file permission check\nfor the execute bit in some situations. This could allow local,\nunprivileged users to run non-executable files on NFSv4 mounted file\nsystems. (CVE-2009-1630, Moderate)\n\n* a deadlock flaw was found in the Linux kernel splice implementation. This\ndeadlock could occur during interactions between the\ngeneric_file_splice_write() and splice_from_pipe() functions, possibly\nleading to a partial denial of service on the file system partition where\nthe deadlock occurs. (CVE-2009-1961, Moderate)\n\nBug fixes:\n\n* a stack buffer used by get_event_name() was not large enough to\naccommodate the nul terminator that sprintf() writes. In some cases, this\ncould lead to an invalid pointer or a kernel panic. With this update, the\nfunction is modified to allow space for the nul terminator. (BZ#503902)\n\n* free_bootmem() was hard-coded to use node 0. This could have caused a\nkernel panic during boot on a NUMA system that happens to boot on a node\nother than node 0. With this update, free_bootmem() acts on the current\nnode, resolving this issue. (BZ#503048)\n\n* CPU flag mishandling caused TSC clocksource synchronization to fail (TSC\nwas marked unstable) on the Intel\u00ae microarchitecture (Nehalem). In\naddition, TSC clocksource checks added to the 64-bit kernel code are now\npresent for i386 systems. Also, \"/proc/cpuinfo\" now shows TSC-related\nflags. (BZ#50289, BZ#508756)\n\n* barriers are used to make sure delayed work requested from threads is\nprocessed before continuing. run_workqueue(), however, exited before\nprocessing all barriers, causing threads to wait forever. In a reported\ncase, this bug caused missing path issues for Device Mapper Multipathing.\n(BZ#504133)\n\n* calling pipe() with an invalid address caused a file descriptor leak.\n(BZ#509629)\n\n* the code to add \"/dev/rtc\" contained a printk statement without a log\nlevel prefix. (BZ#510099)\n\n* an extra check has been added to the realtime kernel to avoid a rare\ncorruption of the FPU (Floating Point Unit) stack, which could occur if a\ntask using FPU registers was preempted by an interruption. (BZ#509359)\n\n* fix a boot-up problem on HP ProLiant SL2x170z G6 and similar systems by\nadding Intel ICH10 controllers back to the ata_piix driver. (BZ#508783)\n\n* converts a UID comparison in AGP to a more secure capability check. By\ndefault, \"/dev/agpgart\" is accessible only to the root user. (BZ#505493)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1157",
"url": "https://access.redhat.com/errata/RHSA-2009:1157"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "496572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572"
},
{
"category": "external",
"summary": "500297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297"
},
{
"category": "external",
"summary": "502893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=502893"
},
{
"category": "external",
"summary": "502981",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
},
{
"category": "external",
"summary": "503048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503048"
},
{
"category": "external",
"summary": "503474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503474"
},
{
"category": "external",
"summary": "503902",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503902"
},
{
"category": "external",
"summary": "504133",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504133"
},
{
"category": "external",
"summary": "504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "505493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=505493"
},
{
"category": "external",
"summary": "509629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509629"
},
{
"category": "external",
"summary": "510099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510099"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1157.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:34:53+00:00",
"generator": {
"date": "2025-11-21T17:34:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1157",
"initial_release_date": "2009-07-14T19:11:00+00:00",
"revision_history": [
{
"date": "2009-07-14T19:11:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-07-14T15:11:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:34:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "MRG Realtime for RHEL 5 Server",
"product": {
"name": "MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:1::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-5"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-126.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"product": {
"name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"product_id": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-126.el5rt?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-126.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"product": {
"name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"product_id": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-126.el5rt?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"product": {
"name": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"product_id": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-126.el5rt?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:2.6.24.7-126.el5rt.src",
"product": {
"name": "kernel-rt-0:2.6.24.7-126.el5rt.src",
"product_id": "kernel-rt-0:2.6.24.7-126.el5rt.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-126.el5rt?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:2.6.24.7-126.el5rt.src as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src"
},
"product_reference": "kernel-rt-0:2.6.24.7-126.el5rt.src",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch"
},
"product_reference": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686"
},
"product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-1385",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2009-05-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "502981"
}
],
"notes": [
{
"category": "description",
"text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: e1000_clean_rx_irq() denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1385"
},
{
"category": "external",
"summary": "RHBZ#502981",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
}
],
"release_date": "2007-04-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-14T19:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1157"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: e1000_clean_rx_irq() denial of service"
},
{
"cve": "CVE-2009-1389",
"discovery_date": "2009-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504726"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: r8169: fix crash when large packets are received",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1389"
},
{
"category": "external",
"summary": "RHBZ#504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389"
}
],
"release_date": "2009-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-14T19:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1157"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: r8169: fix crash when large packets are received"
},
{
"cve": "CVE-2009-1630",
"discovery_date": "2009-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "500297"
}
],
"notes": [
{
"category": "description",
"text": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1630"
},
{
"category": "external",
"summary": "RHBZ#500297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1630",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1630"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630"
}
],
"release_date": "2009-05-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-14T19:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1157"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission"
},
{
"cve": "CVE-2009-1633",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2009-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "496572"
}
],
"notes": [
{
"category": "description",
"text": "Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1633"
},
{
"category": "external",
"summary": "RHBZ#496572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1633",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1633"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633"
}
],
"release_date": "2009-04-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-14T19:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1157"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server"
},
{
"cve": "CVE-2009-1961",
"discovery_date": "2009-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "503474"
}
],
"notes": [
{
"category": "description",
"text": "The inode double locking code in fs/ocfs2/file.c in the Linux kernel 2.6.30 before 2.6.30-rc3, 2.6.27 before 2.6.27.24, 2.6.29 before 2.6.29.4, and possibly other versions down to 2.6.19 allows local users to cause a denial of service (prevention of file creation and removal) via a series of splice system calls that trigger a deadlock between the generic_file_splice_write, splice_from_pipe, and ocfs2_file_splice_write functions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: splice local denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise Linux MRG 2.\n\nThis issue was fixed in Red Hat Enterprise Linux MRG 1 via https://rhn.redhat.com/errata/RHSA-2009-1157.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1961"
},
{
"category": "external",
"summary": "RHBZ#503474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503474"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1961",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1961"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1961",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1961"
}
],
"release_date": "2009-04-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-14T19:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1157"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: splice local denial of service"
}
]
}
GHSA-G3P7-2P6V-2V85
Vulnerability from github – Published: 2022-05-02 03:24 – Updated: 2022-05-02 03:24Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
{
"affected": [],
"aliases": [
"CVE-2009-1389"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2009-06-16T23:30:00Z",
"severity": "HIGH"
},
"details": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.",
"id": "GHSA-g3p7-2p6v-2v85",
"modified": "2022-05-02T03:24:40Z",
"published": "2022-05-02T03:24:40Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51051"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10415"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8108"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html"
},
{
"type": "WEB",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=fdd7b4c3302c93f6833e338903ea77245eb510b4"
},
{
"type": "WEB",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=fdd7b4c3302c93f6833e338903ea77245eb510b4"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html"
},
{
"type": "WEB",
"url": "http://lkml.org/lkml/2009/6/8/194"
},
{
"type": "WEB",
"url": "http://marc.info/?l=linux-netdev\u0026m=123462461713724\u0026w=2"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35265"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35566"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35847"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36045"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36051"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36131"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36327"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/37298"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/37471"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/40645"
},
{
"type": "WEB",
"url": "http://support.avaya.com/css/P8/documents/100067254"
},
{
"type": "WEB",
"url": "http://support.citrix.com/article/CTX123453"
},
{
"type": "WEB",
"url": "http://wiki.rpath.com/Advisories:rPSA-2009-0111"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2009/dsa-1844"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2009/dsa-1865"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2009/06/10/1"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1157.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1193.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/505254/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/35281"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1023507"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-807-1"
},
{
"type": "WEB",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2010/0219"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2010/1857"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2009-1389
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2009-1389",
"description": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.",
"id": "GSD-2009-1389",
"references": [
"https://www.suse.com/security/cve/CVE-2009-1389.html",
"https://www.debian.org/security/2009/dsa-1865",
"https://www.debian.org/security/2009/dsa-1844",
"https://access.redhat.com/errata/RHSA-2009:1469",
"https://access.redhat.com/errata/RHSA-2009:1457",
"https://access.redhat.com/errata/RHSA-2009:1211",
"https://access.redhat.com/errata/RHSA-2009:1193",
"https://access.redhat.com/errata/RHSA-2009:1157",
"https://linux.oracle.com/cve/CVE-2009-1389.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2009-1389"
],
"details": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.",
"id": "GSD-2009-1389",
"modified": "2023-12-13T01:19:48.367627Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-1389",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.securityfocus.com/archive/1/507985/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"refsource": "MISC",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "http://www.vupen.com/english/advisories/2009/3316",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html"
},
{
"name": "http://secunia.com/advisories/35265",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35265"
},
{
"name": "http://secunia.com/advisories/35566",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35566"
},
{
"name": "http://secunia.com/advisories/35847",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35847"
},
{
"name": "http://secunia.com/advisories/36051",
"refsource": "MISC",
"url": "http://secunia.com/advisories/36051"
},
{
"name": "http://secunia.com/advisories/36131",
"refsource": "MISC",
"url": "http://secunia.com/advisories/36131"
},
{
"name": "http://secunia.com/advisories/36327",
"refsource": "MISC",
"url": "http://secunia.com/advisories/36327"
},
{
"name": "http://secunia.com/advisories/37471",
"refsource": "MISC",
"url": "http://secunia.com/advisories/37471"
},
{
"name": "http://wiki.rpath.com/Advisories:rPSA-2009-0111",
"refsource": "MISC",
"url": "http://wiki.rpath.com/Advisories:rPSA-2009-0111"
},
{
"name": "http://www.debian.org/security/2009/dsa-1844",
"refsource": "MISC",
"url": "http://www.debian.org/security/2009/dsa-1844"
},
{
"name": "http://www.debian.org/security/2009/dsa-1865",
"refsource": "MISC",
"url": "http://www.debian.org/security/2009/dsa-1865"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2009-1157.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1157.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2009-1193.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1193.html"
},
{
"name": "http://www.securityfocus.com/archive/1/505254/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/505254/100/0/threaded"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html"
},
{
"name": "http://secunia.com/advisories/40645",
"refsource": "MISC",
"url": "http://secunia.com/advisories/40645"
},
{
"name": "http://www.vupen.com/english/advisories/2010/1857",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2010/1857"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=fdd7b4c3302c93f6833e338903ea77245eb510b4",
"refsource": "MISC",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=fdd7b4c3302c93f6833e338903ea77245eb510b4"
},
{
"name": "http://lkml.org/lkml/2009/6/8/194",
"refsource": "MISC",
"url": "http://lkml.org/lkml/2009/6/8/194"
},
{
"name": "http://marc.info/?l=linux-netdev\u0026m=123462461713724\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=linux-netdev\u0026m=123462461713724\u0026w=2"
},
{
"name": "http://secunia.com/advisories/36045",
"refsource": "MISC",
"url": "http://secunia.com/advisories/36045"
},
{
"name": "http://secunia.com/advisories/37298",
"refsource": "MISC",
"url": "http://secunia.com/advisories/37298"
},
{
"name": "http://support.avaya.com/css/P8/documents/100067254",
"refsource": "MISC",
"url": "http://support.avaya.com/css/P8/documents/100067254"
},
{
"name": "http://support.citrix.com/article/CTX123453",
"refsource": "MISC",
"url": "http://support.citrix.com/article/CTX123453"
},
{
"name": "http://www.openwall.com/lists/oss-security/2009/06/10/1",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2009/06/10/1"
},
{
"name": "http://www.securityfocus.com/bid/35281",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/35281"
},
{
"name": "http://www.securitytracker.com/id?1023507",
"refsource": "MISC",
"url": "http://www.securitytracker.com/id?1023507"
},
{
"name": "http://www.ubuntu.com/usn/usn-807-1",
"refsource": "MISC",
"url": "http://www.ubuntu.com/usn/usn-807-1"
},
{
"name": "http://www.vupen.com/english/advisories/2010/0219",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2010/0219"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51051",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51051"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10415",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10415"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8108",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8108"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=504726",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:itanium_ia64_montecito:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:git7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc8-kk:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:386:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7_smp:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686_smp:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4_smp:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:x86_64:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:x86_32:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2.27.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8_smp:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:64-bit_x86:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:linux:kernel:2.6.24.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc2_git7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16_rc7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.rc1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_xeon:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc4:x86_32:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:linux:kernel:2.6.25.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.rc2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc_smp:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3_smp:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.rc2-git1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:git1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:x86_64:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-1389"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[linux-netdev] 20090214 r8169: instant crash if receiving packet larger than MTU",
"refsource": "MLIST",
"tags": [],
"url": "http://marc.info/?l=linux-netdev\u0026m=123462461713724\u0026w=2"
},
{
"name": "[oss-security] 20090610 CVE-2009-1389 kernel: r8169: fix crash when large packets are received",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2009/06/10/1"
},
{
"name": "35265",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35265"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=504726",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"name": "[linux-kernel] 20090608 [Security, resend] Instant crash with rtl8169 and large packets",
"refsource": "MLIST",
"tags": [
"Exploit"
],
"url": "http://lkml.org/lkml/2009/6/8/194"
},
{
"name": "35281",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/35281"
},
{
"name": "FEDORA-2009-6768",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html"
},
{
"name": "FEDORA-2009-6883",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html"
},
{
"name": "FEDORA-2009-6846",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html"
},
{
"name": "35566",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/35566"
},
{
"name": "RHSA-2009:1157",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1157.html"
},
{
"name": "MDVSA-2009:148",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148"
},
{
"name": "SUSE-SA:2009:038",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html"
},
{
"name": "36051",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/36051"
},
{
"name": "DSA-1844",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2009/dsa-1844"
},
{
"name": "36045",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/36045"
},
{
"name": "USN-807-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/usn-807-1"
},
{
"name": "http://wiki.rpath.com/Advisories:rPSA-2009-0111",
"refsource": "CONFIRM",
"tags": [],
"url": "http://wiki.rpath.com/Advisories:rPSA-2009-0111"
},
{
"name": "35847",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/35847"
},
{
"name": "RHSA-2009:1193",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1193.html"
},
{
"name": "36131",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/36131"
},
{
"name": "36327",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/36327"
},
{
"name": "DSA-1865",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2009/dsa-1865"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "37471",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/37471"
},
{
"name": "37298",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/37298"
},
{
"name": "ADV-2009-3316",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"name": "http://support.avaya.com/css/P8/documents/100067254",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.avaya.com/css/P8/documents/100067254"
},
{
"name": "http://support.citrix.com/article/CTX123453",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.citrix.com/article/CTX123453"
},
{
"name": "ADV-2010-0219",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2010/0219"
},
{
"name": "1023507",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1023507"
},
{
"name": "ADV-2010-1857",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2010/1857"
},
{
"name": "SUSE-SA:2010:031",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html"
},
{
"name": "40645",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/40645"
},
{
"name": "linux-kernel-rtl8169nic-dos(51051)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51051"
},
{
"name": "oval:org.mitre.oval:def:8108",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8108"
},
{
"name": "oval:org.mitre.oval:def:10415",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10415"
},
{
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "20090724 rPSA-2009-0111-1 kernel",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/505254/100/0/threaded"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=fdd7b4c3302c93f6833e338903ea77245eb510b4",
"refsource": "MISC",
"tags": [],
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=fdd7b4c3302c93f6833e338903ea77245eb510b4"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T02:20Z",
"publishedDate": "2009-06-16T23:30Z"
}
}
}
FKIE_CVE-2009-1389
Vulnerability from fkie_nvd - Published: 2009-06-16 23:30 - Updated: 2026-04-23 00:35{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:linux:kernel:2.6.24.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1760FDC9-BB79-4299-8A6D-482085EE5BD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:linux:kernel:2.6.25.15:*:*:*:*:*:*:*",
"matchCriteriaId": "56EEB157-5037-4EAD-8625-35B91B167111",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AAEC8651-9291-4CAE-AA49-C1CA4C7AE450",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0FC560CC-F785-42D5-A25B-1BA02E7AC464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142BCD48-8387-4D0C-A052-44DD4144CBFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:64-bit_x86:*:*:*:*:*",
"matchCriteriaId": "A12077FF-39D0-474A-AB6C-62926CC065B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:itanium_ia64_montecito:*:*:*:*:*",
"matchCriteriaId": "508BC14E-41D8-4847-AE0F-7830E2EE0522",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
"matchCriteriaId": "7BCA84E2-AC4A-430D-8A30-E660D2A232A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*",
"matchCriteriaId": "2255842B-34CD-4062-886C-37161A065703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*",
"matchCriteriaId": "F0ED322D-004C-472E-A37F-89B78C55FE5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
"matchCriteriaId": "412F7334-C46B-4F61-B38A-2CA56B498151",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
"matchCriteriaId": "5967AF83-798D-4B1E-882A-5737FFC859C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
"matchCriteriaId": "A90D2123-D55B-4104-8D82-5B6365AA3B77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
"matchCriteriaId": "DCCDFD49-D402-420E-92F5-20445A0FE139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
"matchCriteriaId": "2A073700-E8A9-4F76-9265-2BE0D5AC9909",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
"matchCriteriaId": "8877D178-1655-46E9-8F5A-2DD576601F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
"matchCriteriaId": "0D55059C-B867-4E0F-B29C-9CD2C86915A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
"matchCriteriaId": "8358E965-3689-4B05-8470-C4A1463FA0E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E8220D81-9065-471F-9256-CFE7B9941555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D2A55C17-C530-4898-BC95-DE4D495F0D7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2C14A949-E2B8-4100-8ED4-645CB996B08A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*",
"matchCriteriaId": "81941077-0011-4272-A8C7-21D0AFE7DECB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EB445E3E-CCBD-4737-BE30-841B9A79D558",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "9B2EDDD7-5B3E-45AA-BC42-A6FF516B8F57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "02F89C7A-24F2-4518-A605-78A5B7056A1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "2C43BA02-0686-42F0-B901-4CB88459E2D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2.27.13:*:*:*:*:*:*:*",
"matchCriteriaId": "241FF5F5-516B-4F77-ABAF-787DFEFEC1AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F5301E27-8021-467C-A9A2-AF2137EF0299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "59393187-1D1E-45CD-BE0E-385F978E4834",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D0CCDF6B-0365-4553-B161-3F6D68A58F72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*",
"matchCriteriaId": "A9B2BB71-0489-40F6-9CB6-A95B96E92106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*",
"matchCriteriaId": "842ECCE2-60F0-41C0-9EAA-A43AF97F61AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "79787868-2D77-4B55-AD61-C2B357CCE047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "05F0391C-D4CC-4652-A24C-DC47F4C3DC91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*",
"matchCriteriaId": "56340FF9-EE77-4EB3-9720-240FAAEF39F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*",
"matchCriteriaId": "79EB0E94-6AE8-4703-96BD-B927E0F2893F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B3F27D3-8F1D-4576-A584-1E2059CC67B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8A1F1242-0F07-4D81-9175-3BA5B2C7B564",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*",
"matchCriteriaId": "3ECBCF2E-95B3-4BE9-9B93-6390AB578C7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*",
"matchCriteriaId": "1CF4EC75-06A2-4BD4-A39A-183F00C46E11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5D260C-AE1C-47E9-A88C-B9C2B4349249",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A0934C49-5F88-4189-BD88-2F32C39C2F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DFC3618C-FBE8-4F7C-BECE-F2CDDF785599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*",
"matchCriteriaId": "A6501752-2595-4412-9140-C78EB9FD41CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "AA9958C6-AB7D-4B67-9AA7-42B628CBC391",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*",
"matchCriteriaId": "14B0A230-4054-4483-A3A7-9A5A286C7552",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0D78F881-DB3A-423A-8DAD-314645B2B3EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*",
"matchCriteriaId": "D77D4CC4-7008-4E6F-A8CA-62DA244BB3AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*",
"matchCriteriaId": "F90242EF-048B-4539-AA41-87AA84875A9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*",
"matchCriteriaId": "3C4E9325-2A70-4E15-9AAF-5588BF218055",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*",
"matchCriteriaId": "01402A85-B681-4DE0-B7BB-F52567DA29E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*",
"matchCriteriaId": "70D1E088-5A9B-4CBF-A4FF-969201942CCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "455E647F-73DD-400A-AA19-3D93FE2E57AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "ABEBD63E-6194-4CB4-A1CE-E4FBB6F0A6E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:386:*:*:*:*:*",
"matchCriteriaId": "27B3F220-7FE0-4D47-918B-C9CBFAD23808",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686:*:*:*:*:*",
"matchCriteriaId": "813C1C54-697D-4170-8202-E07FF578815A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686_smp:*:*:*:*:*",
"matchCriteriaId": "51403992-077A-4F6F-8722-DAAD30489DB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64:*:*:*:*:*",
"matchCriteriaId": "BD22CEB2-838D-4D03-B1D0-2735CA5CA7EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8:*:*:*:*:*",
"matchCriteriaId": "0B066E6A-B150-4D5F-8263-F955EB366806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8_smp:*:*:*:*:*",
"matchCriteriaId": "6D4A2EB4-9F3C-4FEC-96FA-339C6FBD8D6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_xeon:*:*:*:*:*",
"matchCriteriaId": "2A58C85C-BF31-4EDB-9CEA-1F31EA0AEC58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7:*:*:*:*:*",
"matchCriteriaId": "72587FF5-B82D-42DE-A35B-0ECA76C37D54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7_smp:*:*:*:*:*",
"matchCriteriaId": "013D2D76-AFAD-4479-B814-8597D8F51B7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3:*:*:*:*:*",
"matchCriteriaId": "86F9C61A-913C-42BA-BD16-BF82F75AA84B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3_smp:*:*:*:*:*",
"matchCriteriaId": "B6E51493-8AE7-4F18-85BD-D0444A297C1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4:*:*:*:*:*",
"matchCriteriaId": "CD68B4B3-CCF4-4A64-8C67-F549CC905A06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4_smp:*:*:*:*:*",
"matchCriteriaId": "D9350C90-D7A3-4DFF-A574-D079A4DCC453",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc:*:*:*:*:*",
"matchCriteriaId": "9A27FA94-0483-4DD7-A2C4-9FA246526243",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc_smp:*:*:*:*:*",
"matchCriteriaId": "E2076DD5-3110-4C81-BD0B-3B2A4D75AAE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B812DFE2-6FFA-4D31-839C-0CCB2B1310EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*",
"matchCriteriaId": "1FC53528-A67F-42DF-B8DA-778A65893F9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FC106BDA-2EA4-41A2-AA01-6352A5C255B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "FB515243-7519-4CA4-9267-D9A6798CBC49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "B672E1B6-E8E9-473F-853F-906EA56D712E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "0EA23C4F-0848-4680-ACB0-CBC57D3F8C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2CDE1E92-C64D-4A3B-95A2-384BD772B28B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "9F727CD3-D3C2-4648-9EC5-092DF3F73B13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4B130EB7-A951-4717-A906-E2F602F7B69F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*",
"matchCriteriaId": "D1765065-ABE5-478C-9ACC-EFFA8E4A7043",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9D90502F-EC45-4ADC-9428-B94346DA660B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:x86_64:*:*:*:*:*",
"matchCriteriaId": "79C73761-289A-4BEE-BC3F-A5EC4AC7B2CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D8DE0233-BE28-4C0A-B9FB-2157F41F8D4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2422569B-02ED-4028-83D8-D778657596B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E66E4653-1A55-4827-888B-E0776E32ED28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "6C8994CB-7F94-43FB-8B84-06AEBB34EAE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*",
"matchCriteriaId": "95DD4647-564E-4067-A945-F52232C0A33A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1CD39A7A-9172-4B85-B8FE-CEB94207A897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "81DE32C2-5B07-4812-9F88-000F5FB000C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "02EED3D5-8F89-4B7F-A34B-52274B1A754F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5F87AA89-F377-4BEB-B69F-809F5DA6176C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C27AF62E-A026-43E9-89E6-CD807CE9DF51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*",
"matchCriteriaId": "79C2AE0E-DAE8-4443-B33F-6ABA9019AA88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D343B121-C007-49F8-9DE8-AA05CE58FF0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*",
"matchCriteriaId": "7936B7EE-9CD1-4698-AD67-C619D0171A88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*",
"matchCriteriaId": "3A0370A2-0A23-4E34-A2AC-8D87D051B0B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5738D628-0B2D-4F56-9427-2009BFCB6C11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:*",
"matchCriteriaId": "6E20AD05-586B-4493-9793-3FF8028CF887",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F43EBCB4-FCF4-479A-A44D-D913F7F09C77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "169446DE-67F8-4738-91FE-ED8058118F80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4F76C298-81DC-43E4-8FC9-DC005A2116EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*",
"matchCriteriaId": "0AB349B2-3F78-4197-882B-90ADB3BF645A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*",
"matchCriteriaId": "6AC88830-A9BC-4607-B572-A4B502FC9FD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*",
"matchCriteriaId": "476CB3A5-D022-4F13-AAEF-CB6A5785516A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8CFD5CDD-1709-44C7-82BD-BAFDC46990D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "860F9225-8A3F-492C-B72B-5EFFB322802C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "57E23724-2CA4-4211-BB83-38661BE7E6AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*",
"matchCriteriaId": "8D7BBB5F-44F7-467F-B934-33ABF744A107",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*",
"matchCriteriaId": "0478831E-87B2-441F-AEC2-403A35FED1D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6143DC1F-D62E-4DB2-AF43-30A07413D68B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "93F0834D-C5EA-4C96-8D6C-3123ECF78F8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F1784CBC-BEAF-48E5-95A4-2A4BD5F9F1BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*",
"matchCriteriaId": "31523E67-5E4F-43F7-9410-20CB3F287DAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*",
"matchCriteriaId": "5D9F976B-1328-40FE-A1F2-C1DF3F836604",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*",
"matchCriteriaId": "9B627DE3-2702-4EB2-9733-253D315FB594",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*",
"matchCriteriaId": "10E1B011-8D20-448E-9DD5-023DD30D1FE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*",
"matchCriteriaId": "2A29A4BC-0442-458E-A874-BF0D0F2870FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "298266AB-2A36-4606-BF80-2185FC56C4D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7C2658CA-56C2-494F-AC42-618EC413CBDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AD34526D-F2CC-44C5-991D-B1E41C327860",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C2F0B900-34E9-4545-B7AE-AF0A4363EACE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B36F432D-FED1-4B8D-A458-BEDEEF306AB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*",
"matchCriteriaId": "5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "04F25DE0-CA8E-4F57-87A5-C30D89CC9E44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F87F764B-4097-44FA-B96E-A5DA75E31F7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*",
"matchCriteriaId": "D7025803-C679-44DB-ADEE-864E6CAAD9B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*",
"matchCriteriaId": "24B879D6-4631-49A8-9366-75577DFB755D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*",
"matchCriteriaId": "C5B76C21-70C8-4911-A24B-270F876EF7C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "25379B32-D898-4E44-A740-978A129B5E05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7B90F8F2-9549-413D-9676-3EF634D832B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*",
"matchCriteriaId": "915E64EF-6EEC-4DE2-A285-5F3FCE389645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*",
"matchCriteriaId": "585BEE46-088A-494E-8E18-03F33F6BBEA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF35478-B292-4A00-B985-CEEDE8B212C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6E85846A-61BE-4896-B4A6-42A7E1DBA515",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D6E3B925-031D-4F6D-915A-A16F0FFA878C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*",
"matchCriteriaId": "7344B707-6145-48BA-8BC9-9B140A260BCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*",
"matchCriteriaId": "390B1E09-7014-4A74-834C-806BBEBAF6F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*",
"matchCriteriaId": "FEF02479-2124-4655-A38D-A4793D3B8A1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*",
"matchCriteriaId": "0FB5CF04-B5B6-4DFB-B051-61EDA257019F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A89DC9CD-C06F-4B9B-B376-900E65016296",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*",
"matchCriteriaId": "15BED7A7-3E96-43EF-8B6F-3C94897C3AA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8C6FCAC4-B6C6-4125-B3AC-F30407AA7738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*",
"matchCriteriaId": "707ECC75-65B6-4B02-BE85-A4804549A2DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BFCEA98-C708-4E1E-B189-E6F96D28F07A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B753112-CCDE-4870-AA97-4AAA2946421A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*",
"matchCriteriaId": "79B3AFE7-F4FF-4144-9046-E5926E305A03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7616E197-ACCA-4191-A513-FD48417C7F88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*",
"matchCriteriaId": "ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7EE2F94D-E8E0-4BB7-A910-378012580025",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*",
"matchCriteriaId": "66F5AE3B-B701-4579-B44A-0F7A4267852E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1EBB1A21-3826-4BC5-A243-AF8F8D1D4728",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*",
"matchCriteriaId": "34E60197-56C3-485C-9609-B1C4A0E0FCB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D1369C4A-EF3B-4805-9046-ADA38ED940C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*",
"matchCriteriaId": "CC3639E1-B5E4-4DD6-80D4-BA07D192C42D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*",
"matchCriteriaId": "54393D69-B368-4296-9798-D81570495C6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*",
"matchCriteriaId": "6791A801-9E06-47DD-912F-D8594E2F6B3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*",
"matchCriteriaId": "AE90CCED-3A5B-46E3-A6B0-4865AB786289",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*",
"matchCriteriaId": "CBFF6DE7-6D7C-469A-9B2D-2F6E915F55B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "86E452E4-45A9-4469-BF69-F40B6598F0EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C5751AC4-A60F-42C6-88E5-FC8CFEE6F696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*",
"matchCriteriaId": "48777A01-8F36-4752-8F7A-1D1686C69A33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*",
"matchCriteriaId": "42DA6A18-5AA1-4920-94C6-8D0BB73C5352",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*",
"matchCriteriaId": "992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E51F0211-2D3E-4260-AD63-E83AE4EC4AF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4C4E1245-C6BB-462C-9E27-C608595DAE3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*",
"matchCriteriaId": "747F1324-AEFA-496F-9447-12CD13114F60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*",
"matchCriteriaId": "795C3B17-687E-4F33-AA99-8FEC16F14693",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*",
"matchCriteriaId": "190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6B81A4DD-2ADE-4455-B517-5E4E0532D5A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4BD589CC-666B-4FAA-BCF0-91C484BDDB09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD622EE-A840-42E1-B6BF-4AA27D039B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*",
"matchCriteriaId": "900D6742-DE0F-45C5-A812-BF84088CB02A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*",
"matchCriteriaId": "225CA94C-8C84-4FA6-95D0-160A0016FBFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*",
"matchCriteriaId": "D88ED3C4-64C5-44B2-9F23-E16087046C40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*",
"matchCriteriaId": "03FB31E5-190C-489A-AB30-910D2CC854F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*",
"matchCriteriaId": "EF4A781A-4A41-466F-8426-10B40CF8BA1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*",
"matchCriteriaId": "9ED29B3F-456B-4767-8E59-8C19A3B7E1D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*",
"matchCriteriaId": "F6316369-B54A-4E59-A022-E0610353B284",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*",
"matchCriteriaId": "073C3CE0-E12D-4545-8460-5A1514271D50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*",
"matchCriteriaId": "670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*",
"matchCriteriaId": "AEB33DEA-13C7-4B36-AB8A-ED680679A071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*",
"matchCriteriaId": "86DD0FCC-BB12-410D-8C82-AB99C7C5311E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*",
"matchCriteriaId": "83700989-8820-48DA-A9FE-6A77DF1E8439",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*",
"matchCriteriaId": "CC9F4CEC-7781-468B-B460-4F487B7C6601",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*",
"matchCriteriaId": "67C75A62-8807-4821-9362-1E0D63C0A1B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*",
"matchCriteriaId": "894D4812-D62F-489E-8D0E-5E9468CE8EC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F92E01-4F08-4364-9E87-FFBC095E32E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*",
"matchCriteriaId": "F9960640-F02D-4E81-A34B-1893D8FD7F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*",
"matchCriteriaId": "D9D00DAD-4F2D-45C7-B87C-85118D9DD855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*",
"matchCriteriaId": "0C398D26-7132-4A6E-9003-77246644451B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*",
"matchCriteriaId": "5EED2DA2-2516-42E9-8A33-0FA64BF51DB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*",
"matchCriteriaId": "FF425F00-41BA-4F59-A0DE-6362A1E9A142",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*",
"matchCriteriaId": "33577E79-1B6E-406D-A49B-2CEF1754F5D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*",
"matchCriteriaId": "8B21D90E-5172-485E-87AC-F1681604AD7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*",
"matchCriteriaId": "C41F6822-92BF-43F5-8B3E-8BAF9E9A320D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*",
"matchCriteriaId": "641EECFD-A985-4026-A53A-10FBE47EAD91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*",
"matchCriteriaId": "47595F81-2083-4236-A0B0-E2B98DD78402",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*",
"matchCriteriaId": "8F5FC758-5A5D-466A-8386-5FC469F79F66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*",
"matchCriteriaId": "0CCA5C83-5293-4107-8E6A-85F82ECF2C80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*",
"matchCriteriaId": "C2D0AADC-BC34-40FB-BD69-37981DC8E971",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*",
"matchCriteriaId": "3CA7EAC4-7696-41CE-8EE9-3E39DE226BD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*",
"matchCriteriaId": "12547B6B-78F1-4426-81CE-5F208794658C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*",
"matchCriteriaId": "38429E64-276B-46D4-AACD-05349D6F6615",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*",
"matchCriteriaId": "E89640F8-313B-4A36-A591-36645D1EF838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*",
"matchCriteriaId": "CE0271F0-41F2-4096-8C91-DAD1A81AF855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*",
"matchCriteriaId": "7A40DCBB-B41B-468E-A918-6EA3F9A125E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*",
"matchCriteriaId": "921B6A54-85E3-4867-8EDF-93EB86BAFBD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A2C6F1-ED7E-4E51-BE72-BD744D554EE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*",
"matchCriteriaId": "2B004CF1-0ACC-441C-9F61-9B20504F4ECC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*",
"matchCriteriaId": "04B42F06-AC6D-40F3-BC03-5126BED48F36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*",
"matchCriteriaId": "0A8002C7-19E2-4F20-890E-4BA2029174D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*",
"matchCriteriaId": "34FC90C2-AED0-4EAF-B5E8-DE75961DA26E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*",
"matchCriteriaId": "E7DA9C54-742C-4057-8BAB-18755B4A42D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*",
"matchCriteriaId": "84BBE8BE-EAE8-4F7A-85BD-94BBF64F30EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*",
"matchCriteriaId": "53037B40-D534-41D1-9895-8EDB0D884C3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*",
"matchCriteriaId": "5549096F-C640-463E-AD07-FD8D254CC098",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*",
"matchCriteriaId": "F8DCAF19-879C-42BB-B56A-84504E79758A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8ED186-B0FE-4AAC-9B20-DFAD75D7F677",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16_rc7:*:*:*:*:*:*:*",
"matchCriteriaId": "E55F2549-F813-4BD6-8933-6788D898ECB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*",
"matchCriteriaId": "9E86E13B-EC92-47F3-94A9-DB515313011D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "980A6C7D-6175-4A44-8377-74AA7A9FD108",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5C226902-04D9-4F32-866C-20225841ECF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*",
"matchCriteriaId": "C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*",
"matchCriteriaId": "655DB612-AF49-4C17-AFB9-2E33EE8E0572",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*",
"matchCriteriaId": "7EE30F34-EE81-4E1E-BF9F-A7A36B78B897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*",
"matchCriteriaId": "E1F65DF2-2794-47B7-9676-CCF150683CC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6555D45B-D3B3-4455-AB1E-E513F9FB6139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4FA5E262-7825-496F-AA72-0AD6DE6F3C78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "56C6C01B-4CED-4F37-A415-0603496C27DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FE3ACE7A-A600-4ABB-B988-5D59D626DC0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2F839622-3DE1-4A16-8BD2-5FA2CBF014D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DC47887B-5608-47BE-85EE-563864461915",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AF39E62B-EAB4-44B0-A421-2A71B7DD8341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*",
"matchCriteriaId": "809264F1-763D-4A8F-B206-222332DD8732",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A66ED53E-3139-4972-B027-D614BFFB8628",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*",
"matchCriteriaId": "85A3AB7A-1959-4A57-B83D-B2753C43649E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4A60B265-5508-4EE0-980A-44BB0966FD7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
"matchCriteriaId": "C06F0037-DE20-4B4A-977F-BFCFAB026517",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:x86_32:*:*:*:*:*",
"matchCriteriaId": "A2B1B229-B325-4D8C-B326-1FF6D85891F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1817C772-D367-4ABE-B835-466D31A6DC89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C667B8E4-64EB-4A05-84FF-B2243DEF757D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*",
"matchCriteriaId": "9484B41A-DFB6-4481-80D8-440C711CEA53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*",
"matchCriteriaId": "53D373AF-DE6B-428E-9F0F-F1D220900A4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*",
"matchCriteriaId": "F2975DF7-F916-456C-BF7C-2694559E5282",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*",
"matchCriteriaId": "6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*",
"matchCriteriaId": "784EB96E-2FD3-4F77-8DB6-4D6C7A928946",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7A252C50-D63A-4FC0-A51E-A63A939D6AA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D08CBC56-C820-4513-ABEC-1ABB3EFC3A15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
"matchCriteriaId": "338BB401-8831-4094-9186-2B3CFA5903D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1E32E6BA-AFEF-44A8-B230-87DD043BB222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F69E575B-BD1A-4E50-8D6F-131D5E08058E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*",
"matchCriteriaId": "20F6269B-5F6B-4413-B14D-7AE5442E4CCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*",
"matchCriteriaId": "189D1246-F975-4411-A58B-343ED90485FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1B914F7F-C6BD-4527-B1E9-7FD1E337A18C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*",
"matchCriteriaId": "82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
"matchCriteriaId": "179147E4-5247-451D-9409-545D661BC158",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "4ED4E9DD-DDAD-46A8-9AD2-9CAE406F7575",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "8D97ED16-D6B7-4445-889C-4D6DE2EDC49A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "B2C2D5D4-9A4B-4CDF-8D71-D22EB5E97D5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "DFFB2843-A867-48EC-97D7-B106C7BBAED0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6554469E-F6AE-4EB0-880E-CBFD196FEE31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C20367B0-F722-4442-8B59-ABB0FEDB8CC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*",
"matchCriteriaId": "86A98A70-51E3-4556-8DC4-DD09CF370D1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*",
"matchCriteriaId": "469EE3B0-3CC2-4AC2-86A0-2DF34205E707",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8EC547EB-9308-4477-8256-A0E04B42D6DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"matchCriteriaId": "C6940324-0383-4510-BA55-770E0A6B80B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*",
"matchCriteriaId": "FB1E1A8B-6FA1-45AD-B034-EC34884527DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1E3313D5-52E8-49B3-B145-170D9A26DA43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3D3A5FD5-4C42-4B00-8473-D5650FAED9C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*",
"matchCriteriaId": "480F035A-A59D-4113-A246-DF108BB2F591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30D39E29-B2A0-4075-84AF-994C27AB0A68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*",
"matchCriteriaId": "19879317-B067-45DA-B497-21EBDDDC2521",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D220C745-28AD-4D04-B2D2-A090D229206E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*",
"matchCriteriaId": "E4AF8895-7BF8-458E-B2BB-68699AABC023",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*",
"matchCriteriaId": "CA768A9D-6C63-405E-9D14-5D68F8E93A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FF495E58-DA6C-402D-B381-4929CB8A502B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A591301C-C30F-44AC-90F0-709A18AA96E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*",
"matchCriteriaId": "F7D2606B-00A6-4FA3-A00D-B1E8A80B947C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*",
"matchCriteriaId": "610A93BB-70E3-4BF1-83E8-8A7388477F44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*",
"matchCriteriaId": "821BD11F-3C6A-4424-BC9B-DFD786248B07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*",
"matchCriteriaId": "6F55A024-9F8E-44F8-A0D8-696BC232524A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*",
"matchCriteriaId": "84595143-3B04-4CE8-81C0-28EEEC58CD0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*",
"matchCriteriaId": "32EE2B49-DDEB-4B49-A5F0-CAA161095A5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*",
"matchCriteriaId": "C3ABFA33-8FA1-488E-A9BD-1593F495F595",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*",
"matchCriteriaId": "62F6DE3A-E6CC-4D7E-BD08-E43DC4182200",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*",
"matchCriteriaId": "A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"matchCriteriaId": "50B422D1-6C6E-4359-A169-3EED78A1CF40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*",
"matchCriteriaId": "C8CBD2D9-3765-40B2-A056-D71BE750CC01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*",
"matchCriteriaId": "A8F4D967-ED04-42EA-8B3E-36301D39D651",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*",
"matchCriteriaId": "C498EE89-7F07-4B1E-90E6-5897E6B04670",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*",
"matchCriteriaId": "708656AF-92AE-4EAF-AF19-F457DB04ADB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*",
"matchCriteriaId": "3B263AB8-74A4-4C73-915C-A02724C24B45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*",
"matchCriteriaId": "A96D739B-9E8B-4D2F-9DED-4C9B313473CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*",
"matchCriteriaId": "4ACDEFEE-B946-4232-8BD5-A9F7AA84ED85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*",
"matchCriteriaId": "247E13CB-9B11-4B64-80AD-C0F8482CCC0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*",
"matchCriteriaId": "903FE5D3-A9FB-466D-833B-448233BB0803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*",
"matchCriteriaId": "958EDC43-0848-4D93-9D07-6A085A5940B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*",
"matchCriteriaId": "AD35F21D-0A28-4C14-BCF5-8EDA760701C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*",
"matchCriteriaId": "3AAD8BE9-A05B-40E8-80DF-0B2878968BD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A2F19064-CFBF-4B3C-A0A1-CE62265CD592",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AB759752-DC19-4750-838B-056063EFDC5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*",
"matchCriteriaId": "96A43C95-8569-40BE-9E5B-F9B3D0B9D188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*",
"matchCriteriaId": "99662904-E5E3-4E81-B199-39707EAEB652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
"matchCriteriaId": "615BDD1D-36AA-4976-909B-F0F66BF1090C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*",
"matchCriteriaId": "D123AAFE-3F17-45C4-9382-BA392FD022C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE8A26D6-1BDA-45F0-8F7C-F95986050E32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "61A3EDF2-09D7-4116-AE46-D86E4B9602AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F320FA9F-C13D-4AA3-B838-A0E5D63E6A29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B179CF1D-084D-4B21-956F-E55AC6BDE026",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6F1B4877-286A-44B5-9C5C-0403F75B2BAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*",
"matchCriteriaId": "432CA976-6EFA-4D34-B5EA-CD772D067F93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:x86_64:*:*:*:*:*",
"matchCriteriaId": "1BACA0F0-B7B5-4C8B-8D9A-DAA803960AAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6E476195-657E-416E-BC16-44A18B06A133",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*",
"matchCriteriaId": "70460F6C-D6C0-4C1A-B13E-368705EAF223",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*",
"matchCriteriaId": "3F26BA18-08AD-45FE-9F83-25CCB2E27270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6EBFF148-3EDA-4216-910B-8930D8C443C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*",
"matchCriteriaId": "648C63F7-EA1D-4F2E-B8AF-1F380C83E542",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*",
"matchCriteriaId": "1697B855-4834-4633-A5C8-C1F7F13ACE0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*",
"matchCriteriaId": "1FBAE75F-9145-4B9A-A6D8-E488C5326145",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*",
"matchCriteriaId": "DFF566DA-0F04-48DA-AA40-565979C55328",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*",
"matchCriteriaId": "5990C6C2-2F66-4C4D-8224-74163865F410",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*",
"matchCriteriaId": "3A45A9B9-4B19-4A5B-BC95-BCBC4EF00F12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*",
"matchCriteriaId": "C23AD176-3B99-4593-BCBD-13C1E579A13E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*",
"matchCriteriaId": "034DFD7F-8919-4245-8480-7B272F591271",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*",
"matchCriteriaId": "4CEBC606-6488-48CE-8AA8-5B8CC724D5D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*",
"matchCriteriaId": "A83C60AF-50A9-480E-860D-45E80AC0A6B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
"matchCriteriaId": "5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0E249774-CE05-43D5-A5A3-7CCE24BB2AD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*",
"matchCriteriaId": "8D42BA44-C69B-4170-9867-CABF93CA9BD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5140380C-71BD-464F-AE53-1814C2653056",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B18EC0A7-8616-4039-B98B-E1216E035B05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*",
"matchCriteriaId": "22FB141B-FA2A-435D-8937-83FC0669CB20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C59131C8-F66A-4380-9F6E-3FC14C7C8562",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A5421616-4BF5-4269-8996-C3D2BA6AE2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*",
"matchCriteriaId": "23FC6CE2-8717-4558-A309-A441D322F00E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*",
"matchCriteriaId": "311BE336-7BB2-47C0-AED5-3DEA706C206F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5AAC2E9D-0E82-4866-9046-ADD448418198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*",
"matchCriteriaId": "67F2047A-5F17-4B59-9075-41A5DC5C1CD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*",
"matchCriteriaId": "9A12DE15-E192-4B90-ADB7-A886B3746DD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*",
"matchCriteriaId": "FF6588E7-F4FA-40F5-8945-FC7B6094376E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*",
"matchCriteriaId": "F8B59FCD-8161-48EF-844D-8FA1AB2FAA76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2DA311B8-D32E-4853-9B07-58EAF1019D0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F0F0F679-43C8-426E-A97E-C3B207A3331C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc4:*:*:*:*:*:*",
"matchCriteriaId": "FAE6A7F3-3D04-4119-874D-DA2FA86B7BE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc5:*:*:*:*:*:*",
"matchCriteriaId": "BA40BC48-D6B5-4424-B306-F99E85EBBCB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc6:*:*:*:*:*:*",
"matchCriteriaId": "6C2DF2BB-F94A-4692-AFDC-47C42F04081B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc7:*:*:*:*:*:*",
"matchCriteriaId": "BB286B42-E739-46CD-BC96-972CFFAECB0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc8:*:*:*:*:*:*",
"matchCriteriaId": "7636014B-CC2A-43A3-9C9A-04B26AEB06D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc9:*:*:*:*:*:*",
"matchCriteriaId": "A4ED7CE5-3388-4CB9-AF60-A2AF19611327",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C75A8FC4-58D2-4B6A-9D8E-FF12DF52E249",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DE21E2AE-9E01-471C-A419-6AB40A49C2F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ADFC2D46-65D0-426F-9AF8-8C910AE91D49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*",
"matchCriteriaId": "11795F8E-7ACD-4597-9194-FC7241DCE057",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*",
"matchCriteriaId": "60F381E1-F3C5-49BE-B094-4D90E7B108F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D82A6217-CFA6-4E72-8BED-0297E13EABF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7CEA1AF2-2DE7-4B38-987D-15FFA70F06B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*",
"matchCriteriaId": "7954A701-1671-4080-B1E6-47E0208FD28C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.20:*:*:*:*:*:*:*",
"matchCriteriaId": "83E5F269-7711-447D-B798-0F5478E36299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.21:*:*:*:*:*:*:*",
"matchCriteriaId": "A0138807-6313-4A3F-AB5A-4B7D4A9BE287",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.22:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BA2227-F259-499D-BF50-5074B1E7DD3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.23:*:*:*:*:*:*:*",
"matchCriteriaId": "78A896D0-032C-4467-9D57-E47E8C612704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.24:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1D4C8F-8C09-4A49-AFFD-33093AE7A437",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*",
"matchCriteriaId": "26BD805F-08EB-42EC-BC54-26A7278E5089",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:git7:*:*:*:*:*:*",
"matchCriteriaId": "CBEBA0F6-5453-4993-932B-BB8941DCC5CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*",
"matchCriteriaId": "3463B83B-E46F-456E-98BA-801C59AEB337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C8A1A8F2-F892-4EDC-A5DA-1BBD6993E84E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*",
"matchCriteriaId": "60EFBFAD-1AF4-49AC-A0E6-A88AB84CD919",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*",
"matchCriteriaId": "05FD0767-03F3-416C-AB6D-6BC4A12220B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*",
"matchCriteriaId": "8452D554-8DEB-4265-839C-6B40CCFB56B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*",
"matchCriteriaId": "94F445F9-57A5-4453-BB5D-290349C04A80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*",
"matchCriteriaId": "62C97D20-4152-47C4-B21B-8206CF49E20A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*",
"matchCriteriaId": "217715A5-E69D-45C0-B8E4-5681528C651B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A87AD66C-4321-4459-8556-3B0BA38C493A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*",
"matchCriteriaId": "87A347E0-9C0B-4674-9363-3C36DA27AC45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8E0F3DF0-6BD0-4560-9A13-C6493939D8B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE1DF7-99CB-416B-B6F9-EC40FBD7D1C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B93AF773-FBB4-4A4A-ADD5-ADA40C24CD36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*",
"matchCriteriaId": "38A55F08-88A9-42D5-A2B1-8B8C0D6DED09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3975EC77-D33D-4167-91BE-08237C3EE9D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*",
"matchCriteriaId": "0A0F2534-C267-43D9-8365-C00CD979B052",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27430190-EB83-43C5-9584-4F65CF65151A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*",
"matchCriteriaId": "C386B13F-9D7C-45F8-B86A-886384144A8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:git1:*:*:*:*:*:*",
"matchCriteriaId": "32F95AB2-319C-4BDE-8D34-9FBE69A2FB6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D48FD9D7-E775-4E26-AEBF-01A09C404D6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*",
"matchCriteriaId": "89EA3CF3-0AB7-4648-96BA-25E978D2C8C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc2_git7:*:*:*:*:*:*",
"matchCriteriaId": "3E4DB179-F78F-4D36-A47D-557FB1B945DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc8-kk:*:*:*:*:*:*",
"matchCriteriaId": "23859759-4748-4A03-9D78-083C77CFF4AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A701E87D-B807-426E-9CD4-6721DBCABE19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.rc1:*:*:*:*:*:*:*",
"matchCriteriaId": "0D5FC0A9-A78A-4D09-BDCC-208AFC899824",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.rc2:*:*:*:*:*:*:*",
"matchCriteriaId": "7DBFC9DD-B7C2-4FB2-A8F6-29FF50EFAAE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.rc2-git1:*:*:*:*:*:*:*",
"matchCriteriaId": "54B3BFC1-4B0A-4D63-BFA2-CF6A51A8D2F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E242D3DE-D1DC-406A-BCC3-C4380B7EC369",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc4:x86_32:*:*:*:*:*",
"matchCriteriaId": "06EFB3F7-2EAE-4A56-A9A1-E8C734E6B91E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*",
"matchCriteriaId": "608FDE1E-B02A-45A2-8877-0E52A5BD0963",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet."
},
{
"lang": "es",
"value": "Desbordamiento de memoria en el driver RTL8169 NIC (drivers/net/r8169.c) en el kernel de Linux anteriores a v2.6.30 permite a atacantes remotos producir una denegaci\u00f3n de servicio (consumo de memoria del kernel y ca\u00edda) a trav\u00e9s de un paquete largo."
}
],
"id": "CVE-2009-1389",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-06-16T23:30:00.187",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=fdd7b4c3302c93f6833e338903ea77245eb510b4"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit"
],
"url": "http://lkml.org/lkml/2009/6/8/194"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=linux-netdev\u0026m=123462461713724\u0026w=2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35265"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/35566"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/35847"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/36045"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/36051"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/36131"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/36327"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/37298"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/37471"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/40645"
},
{
"source": "secalert@redhat.com",
"url": "http://support.avaya.com/css/P8/documents/100067254"
},
{
"source": "secalert@redhat.com",
"url": "http://support.citrix.com/article/CTX123453"
},
{
"source": "secalert@redhat.com",
"url": "http://wiki.rpath.com/Advisories:rPSA-2009-0111"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2009/dsa-1844"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2009/dsa-1865"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2009/06/10/1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1157.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1193.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/505254/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/35281"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securitytracker.com/id?1023507"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/usn-807-1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2010/0219"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2010/1857"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51051"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10415"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8108"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=fdd7b4c3302c93f6833e338903ea77245eb510b4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://lkml.org/lkml/2009/6/8/194"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=linux-netdev\u0026m=123462461713724\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35265"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/35566"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/35847"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/36045"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/36051"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/36131"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/36327"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/37298"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/37471"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/40645"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.avaya.com/css/P8/documents/100067254"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.citrix.com/article/CTX123453"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://wiki.rpath.com/Advisories:rPSA-2009-0111"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2009/dsa-1844"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2009/dsa-1865"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2009/06/10/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1157.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1193.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/505254/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/35281"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1023507"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-807-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2010/0219"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2010/1857"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51051"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10415"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8108"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.