Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2009-1439
Vulnerability from cvelistv5
Published
2009-04-27 17:43
Modified
2024-08-07 05:13
Severity ?
EPSS score ?
Summary
Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:13:25.460Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "35390", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35390" }, { "name": "[oss-security] 20090407 Re: CVE request? buffer overflow in CIFS in 2.6.*", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/04/07/7" }, { "name": "[oss-security] 20090405 CVE request? buffer overflow in CIFS in 2.6.*", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/04/04/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b363b3304bcf68c4541683b2eff70b29f0446a5b" }, { "name": "35226", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35226" }, { "name": "SUSE-SA:2009:028", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html" }, { "name": "37471", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37471" }, { "name": "FEDORA-2009-5356", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01126.html" }, { "name": "SUSE-SA:2009:032", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00002.html" }, { "name": "35656", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35656" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://xorl.wordpress.com/2009/04/07/linux-kernel-tree-connect-cifs-remote-buffer-overflow/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "oval:org.mitre.oval:def:8265", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8265" }, { "name": "DSA-1794", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1794" }, { "name": "20090516 rPSA-2009-0084-1 kernel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/503610/100/0/threaded" }, { "name": "34453", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34453" }, { "name": "SUSE-SA:2009:030", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" }, { "name": "35185", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35185" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "name": "35011", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35011" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.fefe.de/?ts=b72905a8" }, { "name": "[oss-security] 20090407 Re: CVE request? buffer overflow in CIFS in 2.6.*", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/04/07/3" }, { "name": "35120", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35120" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=492282" }, { "name": "SUSE-SA:2009:031", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" }, { "name": "USN-793-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-793-1" }, { "name": "FEDORA-2009-5383", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01271.html" }, { "name": "RHSA-2009:1081", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1081.html" }, { "name": "34981", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34981" }, { "name": "DSA-1800", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1800" }, { "name": "35343", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35343" }, { "name": "[linux-cifs-client] 20090406 [PATCH] cifs: Fix insufficient memory allocation for nativeFileSystem field", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.samba.org/archive/linux-cifs-client/2009-April/004322.html" }, { "name": "35387", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35387" }, { "name": "DSA-1787", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1787" }, { "name": "35217", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35217" }, { "name": "oval:org.mitre.oval:def:10321", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10321" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0084" }, { "name": "35121", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35121" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "35394", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35394" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-04-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "35390", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35390" }, { "name": "[oss-security] 20090407 Re: CVE request? buffer overflow in CIFS in 2.6.*", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/04/07/7" }, { "name": "[oss-security] 20090405 CVE request? buffer overflow in CIFS in 2.6.*", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/04/04/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b363b3304bcf68c4541683b2eff70b29f0446a5b" }, { "name": "35226", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35226" }, { "name": "SUSE-SA:2009:028", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html" }, { "name": "37471", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37471" }, { "name": "FEDORA-2009-5356", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01126.html" }, { "name": "SUSE-SA:2009:032", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00002.html" }, { "name": "35656", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35656" }, { "tags": [ "x_refsource_MISC" ], "url": "http://xorl.wordpress.com/2009/04/07/linux-kernel-tree-connect-cifs-remote-buffer-overflow/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "oval:org.mitre.oval:def:8265", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8265" }, { "name": "DSA-1794", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1794" }, { "name": "20090516 rPSA-2009-0084-1 kernel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/503610/100/0/threaded" }, { "name": "34453", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34453" }, { "name": "SUSE-SA:2009:030", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" }, { "name": "35185", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35185" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "name": "35011", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35011" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.fefe.de/?ts=b72905a8" }, { "name": "[oss-security] 20090407 Re: CVE request? buffer overflow in CIFS in 2.6.*", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/04/07/3" }, { "name": "35120", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35120" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=492282" }, { "name": "SUSE-SA:2009:031", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" }, { "name": "USN-793-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-793-1" }, { "name": "FEDORA-2009-5383", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01271.html" }, { "name": "RHSA-2009:1081", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1081.html" }, { "name": "34981", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34981" }, { "name": "DSA-1800", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1800" }, { "name": "35343", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35343" }, { "name": "[linux-cifs-client] 20090406 [PATCH] cifs: Fix insufficient memory allocation for nativeFileSystem field", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.samba.org/archive/linux-cifs-client/2009-April/004322.html" }, { "name": "35387", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35387" }, { "name": "DSA-1787", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1787" }, { "name": "35217", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35217" }, { "name": "oval:org.mitre.oval:def:10321", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10321" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0084" }, { "name": "35121", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35121" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "35394", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35394" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1439", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "35390", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35390" }, { "name": "[oss-security] 20090407 Re: CVE request? buffer overflow in CIFS in 2.6.*", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/04/07/7" }, { "name": "[oss-security] 20090405 CVE request? buffer overflow in CIFS in 2.6.*", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/04/04/1" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b363b3304bcf68c4541683b2eff70b29f0446a5b", "refsource": "CONFIRM", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b363b3304bcf68c4541683b2eff70b29f0446a5b" }, { "name": "35226", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35226" }, { "name": "SUSE-SA:2009:028", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html" }, { "name": "37471", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37471" }, { "name": "FEDORA-2009-5356", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01126.html" }, { "name": "SUSE-SA:2009:032", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00002.html" }, { "name": "35656", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35656" }, { "name": "http://xorl.wordpress.com/2009/04/07/linux-kernel-tree-connect-cifs-remote-buffer-overflow/", "refsource": "MISC", "url": "http://xorl.wordpress.com/2009/04/07/linux-kernel-tree-connect-cifs-remote-buffer-overflow/" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "oval:org.mitre.oval:def:8265", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8265" }, { "name": "DSA-1794", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1794" }, { "name": "20090516 rPSA-2009-0084-1 kernel", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/503610/100/0/threaded" }, { "name": "34453", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34453" }, { "name": "SUSE-SA:2009:030", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" }, { "name": "35185", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35185" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=494275", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "name": "35011", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35011" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "http://blog.fefe.de/?ts=b72905a8", "refsource": "MISC", "url": "http://blog.fefe.de/?ts=b72905a8" }, { "name": "[oss-security] 20090407 Re: CVE request? buffer overflow in CIFS in 2.6.*", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/04/07/3" }, { "name": "35120", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35120" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=492282", "refsource": "CONFIRM", "url": "https://bugzilla.novell.com/show_bug.cgi?id=492282" }, { "name": "SUSE-SA:2009:031", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" }, { "name": "USN-793-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-793-1" }, { "name": "FEDORA-2009-5383", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01271.html" }, { "name": "RHSA-2009:1081", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1081.html" }, { "name": "34981", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34981" }, { "name": "DSA-1800", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1800" }, { "name": "35343", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35343" }, { "name": "[linux-cifs-client] 20090406 [PATCH] cifs: Fix insufficient memory allocation for nativeFileSystem field", "refsource": "MLIST", "url": "http://lists.samba.org/archive/linux-cifs-client/2009-April/004322.html" }, { "name": "35387", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35387" }, { "name": "DSA-1787", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1787" }, { "name": "35217", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35217" }, { "name": "oval:org.mitre.oval:def:10321", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10321" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2009-0084", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0084" }, { "name": "35121", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35121" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "35394", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35394" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1439", "datePublished": "2009-04-27T17:43:00", "dateReserved": "2009-04-27T00:00:00", "dateUpdated": "2024-08-07T05:13:25.460Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.6.29\", \"matchCriteriaId\": \"3871E973-1DCE-4C2D-8FF0-9330AF928297\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43F9DBB0-8AF7-42CA-95DD-68A344E9D549\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA39D4CE-22F0-46A2-B8CF-4599675E7D3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EDD00664-A27C-4514-A2A4-079E8F9B0251\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E336C792-B7A1-4318-8050-DE9F03474CEF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7228AE50-BACB-4AB8-9CE5-17DB0CD661AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6D260FD-E55E-4A95-AB7F-B880DBE37BAD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E36D0159-1A05-4628-9C1C-360DED0F438C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E6654B9-42EB-4C2C-8F71-710D50556180\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FC560CC-F785-42D5-A25B-1BA02E7AC464\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"142BCD48-8387-4D0C-A052-44DD4144CBFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8220D81-9065-471F-9256-CFE7B9941555\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB445E3E-CCBD-4737-BE30-841B9A79D558\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D90502F-EC45-4ADC-9428-B94346DA660B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CD39A7A-9172-4B85-B8FE-CEB94207A897\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81DE32C2-5B07-4812-9F88-000F5FB000C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02EED3D5-8F89-4B7F-A34B-52274B1A754F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F87AA89-F377-4BEB-B69F-809F5DA6176C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C27AF62E-A026-43E9-89E6-CD807CE9DF51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D343B121-C007-49F8-9DE8-AA05CE58FF0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7936B7EE-9CD1-4698-AD67-C619D0171A88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5738D628-0B2D-4F56-9427-2009BFCB6C11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F43EBCB4-FCF4-479A-A44D-D913F7F09C77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"860F9225-8A3F-492C-B72B-5EFFB322802C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57E23724-2CA4-4211-BB83-38661BE7E6AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6143DC1F-D62E-4DB2-AF43-30A07413D68B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"298266AB-2A36-4606-BF80-2185FC56C4D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C2658CA-56C2-494F-AC42-618EC413CBDF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD34526D-F2CC-44C5-991D-B1E41C327860\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2F0B900-34E9-4545-B7AE-AF0A4363EACE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B36F432D-FED1-4B8D-A458-BEDEEF306AB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25379B32-D898-4E44-A740-978A129B5E05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B90F8F2-9549-413D-9676-3EF634D832B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"915E64EF-6EEC-4DE2-A285-5F3FCE389645\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"585BEE46-088A-494E-8E18-03F33F6BBEA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFF35478-B292-4A00-B985-CEEDE8B212C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E85846A-61BE-4896-B4A6-42A7E1DBA515\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6E3B925-031D-4F6D-915A-A16F0FFA878C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7344B707-6145-48BA-8BC9-9B140A260BCF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BFCEA98-C708-4E1E-B189-E6F96D28F07A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B753112-CCDE-4870-AA97-4AAA2946421A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79B3AFE7-F4FF-4144-9046-E5926E305A03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7616E197-ACCA-4191-A513-FD48417C7F88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EE2F94D-E8E0-4BB7-A910-378012580025\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66F5AE3B-B701-4579-B44A-0F7A4267852E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34E60197-56C3-485C-9609-B1C4A0E0FCB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86E452E4-45A9-4469-BF69-F40B6598F0EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5751AC4-A60F-42C6-88E5-FC8CFEE6F696\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48777A01-8F36-4752-8F7A-1D1686C69A33\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42DA6A18-5AA1-4920-94C6-8D0BB73C5352\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E51F0211-2D3E-4260-AD63-E83AE4EC4AF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C4E1245-C6BB-462C-9E27-C608595DAE3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"747F1324-AEFA-496F-9447-12CD13114F60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"795C3B17-687E-4F33-AA99-8FEC16F14693\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B81A4DD-2ADE-4455-B517-5E4E0532D5A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BD589CC-666B-4FAA-BCF0-91C484BDDB09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CD622EE-A840-42E1-B6BF-4AA27D039B12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"900D6742-DE0F-45C5-A812-BF84088CB02A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"225CA94C-8C84-4FA6-95D0-160A0016FBFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D88ED3C4-64C5-44B2-9F23-E16087046C40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03FB31E5-190C-489A-AB30-910D2CC854F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF4A781A-4A41-466F-8426-10B40CF8BA1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9ED29B3F-456B-4767-8E59-8C19A3B7E1D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6316369-B54A-4E59-A022-E0610353B284\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"073C3CE0-E12D-4545-8460-5A1514271D50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AEB33DEA-13C7-4B36-AB8A-ED680679A071\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86DD0FCC-BB12-410D-8C82-AB99C7C5311E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83700989-8820-48DA-A9FE-6A77DF1E8439\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC9F4CEC-7781-468B-B460-4F487B7C6601\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67C75A62-8807-4821-9362-1E0D63C0A1B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"894D4812-D62F-489E-8D0E-5E9468CE8EC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1F92E01-4F08-4364-9E87-FFBC095E32E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9960640-F02D-4E81-A34B-1893D8FD7F38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9D00DAD-4F2D-45C7-B87C-85118D9DD855\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C398D26-7132-4A6E-9003-77246644451B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EED2DA2-2516-42E9-8A33-0FA64BF51DB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF425F00-41BA-4F59-A0DE-6362A1E9A142\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33577E79-1B6E-406D-A49B-2CEF1754F5D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B21D90E-5172-485E-87AC-F1681604AD7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C41F6822-92BF-43F5-8B3E-8BAF9E9A320D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"641EECFD-A985-4026-A53A-10FBE47EAD91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47595F81-2083-4236-A0B0-E2B98DD78402\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F5FC758-5A5D-466A-8386-5FC469F79F66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CCA5C83-5293-4107-8E6A-85F82ECF2C80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2D0AADC-BC34-40FB-BD69-37981DC8E971\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CA7EAC4-7696-41CE-8EE9-3E39DE226BD3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12547B6B-78F1-4426-81CE-5F208794658C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38429E64-276B-46D4-AACD-05349D6F6615\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E89640F8-313B-4A36-A591-36645D1EF838\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE0271F0-41F2-4096-8C91-DAD1A81AF855\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A40DCBB-B41B-468E-A918-6EA3F9A125E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"921B6A54-85E3-4867-8EDF-93EB86BAFBD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8A2C6F1-ED7E-4E51-BE72-BD744D554EE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B004CF1-0ACC-441C-9F61-9B20504F4ECC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04B42F06-AC6D-40F3-BC03-5126BED48F36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A8002C7-19E2-4F20-890E-4BA2029174D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34FC90C2-AED0-4EAF-B5E8-DE75961DA26E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7DA9C54-742C-4057-8BAB-18755B4A42D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84BBE8BE-EAE8-4F7A-85BD-94BBF64F30EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53037B40-D534-41D1-9895-8EDB0D884C3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5549096F-C640-463E-AD07-FD8D254CC098\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8DCAF19-879C-42BB-B56A-84504E79758A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B8ED186-B0FE-4AAC-9B20-DFAD75D7F677\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E86E13B-EC92-47F3-94A9-DB515313011D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56C6C01B-4CED-4F37-A415-0603496C27DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC47887B-5608-47BE-85EE-563864461915\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF39E62B-EAB4-44B0-A421-2A71B7DD8341\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"809264F1-763D-4A8F-B206-222332DD8732\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A66ED53E-3139-4972-B027-D614BFFB8628\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85A3AB7A-1959-4A57-B83D-B2753C43649E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A60B265-5508-4EE0-980A-44BB0966FD7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C06F0037-DE20-4B4A-977F-BFCFAB026517\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"1817C772-D367-4ABE-B835-466D31A6DC89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"C667B8E4-64EB-4A05-84FF-B2243DEF757D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"9484B41A-DFB6-4481-80D8-440C711CEA53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"53D373AF-DE6B-428E-9F0F-F1D220900A4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2975DF7-F916-456C-BF7C-2694559E5282\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"784EB96E-2FD3-4F77-8DB6-4D6C7A928946\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"338BB401-8831-4094-9186-2B3CFA5903D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20F6269B-5F6B-4413-B14D-7AE5442E4CCD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"189D1246-F975-4411-A58B-343ED90485FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B914F7F-C6BD-4527-B1E9-7FD1E337A18C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"179147E4-5247-451D-9409-545D661BC158\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6554469E-F6AE-4EB0-880E-CBFD196FEE31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C20367B0-F722-4442-8B59-ABB0FEDB8CC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86A98A70-51E3-4556-8DC4-DD09CF370D1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"469EE3B0-3CC2-4AC2-86A0-2DF34205E707\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8EC547EB-9308-4477-8256-A0E04B42D6DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6940324-0383-4510-BA55-770E0A6B80B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E3313D5-52E8-49B3-B145-170D9A26DA43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D3A5FD5-4C42-4B00-8473-D5650FAED9C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"480F035A-A59D-4113-A246-DF108BB2F591\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30D39E29-B2A0-4075-84AF-994C27AB0A68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19879317-B067-45DA-B497-21EBDDDC2521\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D220C745-28AD-4D04-B2D2-A090D229206E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4AF8895-7BF8-458E-B2BB-68699AABC023\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA768A9D-6C63-405E-9D14-5D68F8E93A91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF495E58-DA6C-402D-B381-4929CB8A502B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A591301C-C30F-44AC-90F0-709A18AA96E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7D2606B-00A6-4FA3-A00D-B1E8A80B947C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"610A93BB-70E3-4BF1-83E8-8A7388477F44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"821BD11F-3C6A-4424-BC9B-DFD786248B07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F55A024-9F8E-44F8-A0D8-696BC232524A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84595143-3B04-4CE8-81C0-28EEEC58CD0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32EE2B49-DDEB-4B49-A5F0-CAA161095A5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3ABFA33-8FA1-488E-A9BD-1593F495F595\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62F6DE3A-E6CC-4D7E-BD08-E43DC4182200\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50B422D1-6C6E-4359-A169-3EED78A1CF40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2F19064-CFBF-4B3C-A0A1-CE62265CD592\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB759752-DC19-4750-838B-056063EFDC5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96A43C95-8569-40BE-9E5B-F9B3D0B9D188\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99662904-E5E3-4E81-B199-39707EAEB652\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"615BDD1D-36AA-4976-909B-F0F66BF1090C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE8A26D6-1BDA-45F0-8F7C-F95986050E32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61A3EDF2-09D7-4116-AE46-D86E4B9602AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F320FA9F-C13D-4AA3-B838-A0E5D63E6A29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B179CF1D-084D-4B21-956F-E55AC6BDE026\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F1B4877-286A-44B5-9C5C-0403F75B2BAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"432CA976-6EFA-4D34-B5EA-CD772D067F93\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E476195-657E-416E-BC16-44A18B06A133\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12A55028-B8F9-4AD2-AE57-A80D561F3C79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C4E641C-67D4-4599-8EFB-0B2F8D81D68C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70460F6C-D6C0-4C1A-B13E-368705EAF223\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F26BA18-08AD-45FE-9F83-25CCB2E27270\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EBFF148-3EDA-4216-910B-8930D8C443C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"648C63F7-EA1D-4F2E-B8AF-1F380C83E542\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1697B855-4834-4633-A5C8-C1F7F13ACE0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FBAE75F-9145-4B9A-A6D8-E488C5326145\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFF566DA-0F04-48DA-AA40-565979C55328\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5990C6C2-2F66-4C4D-8224-74163865F410\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A45A9B9-4B19-4A5B-BC95-BCBC4EF00F12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C23AD176-3B99-4593-BCBD-13C1E579A13E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"034DFD7F-8919-4245-8480-7B272F591271\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CEBC606-6488-48CE-8AA8-5B8CC724D5D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A83C60AF-50A9-480E-860D-45E80AC0A6B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22_rc1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44FDF616-E410-4540-B377-98D1FB88CE35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22_rc7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5313B736-9904-442A-84D6-8FC7B9AC2059\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E249774-CE05-43D5-A5A3-7CCE24BB2AD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D42BA44-C69B-4170-9867-CABF93CA9BD6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5140380C-71BD-464F-AE53-1814C2653056\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B18EC0A7-8616-4039-B98B-E1216E035B05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22FB141B-FA2A-435D-8937-83FC0669CB20\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C59131C8-F66A-4380-9F6E-3FC14C7C8562\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5421616-4BF5-4269-8996-C3D2BA6AE2A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23FC6CE2-8717-4558-A309-A441D322F00E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"311BE336-7BB2-47C0-AED5-3DEA706C206F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE87D1BC-A72D-42D2-A93C-67A5823BEB14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AAC2E9D-0E82-4866-9046-ADD448418198\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"760FB32D-9795-4B29-B79A-A32B5E70F7EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DFF67E9-B0C2-48D5-BB3A-CF21D10010FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5881A78C-D162-4DE5-8353-2BB1EC1F428B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B13D81D2-1A89-4E61-A90C-5E8BB880310B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67F2047A-5F17-4B59-9075-41A5DC5C1CD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80F9887E-2466-4C73-A8E1-2117492F9EC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FDE5B27-2EF0-464E-8F14-5E809D84D389\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"815B2EE8-136F-44E4-997D-5F93A54775DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13673DF5-09B1-40C8-AC54-A447DE8AB01E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"085259B8-9D41-42B0-B32B-66B8D365F106\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A12DE15-E192-4B90-ADB7-A886B3746DD7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF6588E7-F4FA-40F5-8945-FC7B6094376E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE87E13E-ACF7-4F74-8938-729F3B0D694C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4965A12-1BBA-4494-A5C1-43E0C0F48C14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52152F5A-1833-4490-A373-9C547B90B0F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B64A095E-5E97-445E-B435-F09983CC0E7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8035F93-9DEE-4B92-ABAA-4ABE0B71BF41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EE92406-DBF3-463E-8A51-F9679E851FDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C60D19B-ED9B-443C-9D49-002ABD381119\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"264C61EE-64F6-43AD-B54F-7D683C29E64F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0149408A-30F6-4EDF-8B3B-CBAB884CE758\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71295664-89EC-4BB3-9F86-B1DDA20FAC5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25:*:x86_64:*:*:*:*:*\", \"matchCriteriaId\": \"6ED1BAE4-A6D3-49A1-BCAD-1E514D42F609\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37BE853A-BA6F-4A70-B166-E34441F0B7DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:x86_64:*:*:*:*:*\", \"matchCriteriaId\": \"4F7C4DFF-616C-497D-9BAB-67C2E21BC21D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85064FDF-4B62-43BF-B36C-F659D739BC22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:x86_64:*:*:*:*:*\", \"matchCriteriaId\": \"E6EBBFE8-2332-45CE-93F8-6815C2AE5D17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEADC505-FF44-4D45-8EA6-B23A1C4564D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:x86_64:*:*:*:*:*\", \"matchCriteriaId\": \"388414A1-C9B4-41BA-AD35-6501A463A095\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CE3C807-5C9B-4B71-868B-DF17ECB1514F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:x86_64:*:*:*:*:*\", \"matchCriteriaId\": \"FDBA01DD-C129-48F1-800B-838418F4A4A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6CADAA2-91D2-40C4-90F3-D7F40A3D4CB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:x86_64:*:*:*:*:*\", \"matchCriteriaId\": \"185F1EF8-04EB-43ED-B909-8BDF60F23E76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45B6847C-873B-4BE1-852D-239115E59BA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:x86_64:*:*:*:*:*\", \"matchCriteriaId\": \"D9D4BCAD-B3CD-4FA1-A833-0D7D40289E07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF41209E-D27F-4642-A405-90E822A41897\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:x86_64:*:*:*:*:*\", \"matchCriteriaId\": \"3483FAFA-353C-498F-AF68-8F5B84A0F30D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97F59FD9-46E5-4F63-80A0-091AD44D1867\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:x86_64:*:*:*:*:*\", \"matchCriteriaId\": \"B3D5AEA5-210B-4E9F-8D9C-C25B84F15C75\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"428844A5-E020-4AE9-8012-9AEDFCB7C32E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:x86_64:*:*:*:*:*\", \"matchCriteriaId\": \"6B11A9E1-9D90-46DC-81B5-17A137205AB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94C9D70D-A552-48D6-9497-EE07EB5649D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:x86_64:*:*:*:*:*\", \"matchCriteriaId\": \"07EEC559-9240-46BE-9057-0F17D1F61F99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF6169FF-9FF9-4A81-BAEB-6D5132F64F61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:x86_64:*:*:*:*:*\", \"matchCriteriaId\": \"BBBC127F-D67E-43FE-BCFE-606C200084F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6DC79CF-A504-4232-9F66-B5DCD0213DA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:x86_64:*:*:*:*:*\", \"matchCriteriaId\": \"42B18945-EE09-4E6B-8C11-E382E5F8F850\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"192B4273-0935-4232-BBFD-A850855CAC5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60E9FDA8-7EC3-4B9B-B508-27F948D60DDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4E4A6E5-0C2C-42FD-B982-684CCB0DDFBB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A16F2182-C489-4CA9-A56B-01463148D16F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"630A56D3-7A82-44DE-8888-2EB8CD1C24A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E0D6431-E8E0-4079-A1A0-9CE6D1D67709\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF4EF7A7-6E96-43B4-8287-368098ABBFA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEF91995-A084-422A-A544-30B0B4D75E22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E45F4429-5A9C-4E8B-96EE-CCF19776CABF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"12D0C03A-7D30-485F-8431-638918FE9658\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EFCAF09-BB20-424C-8648-014C0F71F8A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A74970C-5EEA-47A7-A62D-AF98F4D1228F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEA56669-B09E-42C2-9591-245C46909A2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9B33D60-8023-4A0B-ACF7-9F811EEB8BCD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D08D180-23F7-456F-98CA-26B53C678D76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80E3C363-49C9-4869-83B5-76C14100BFF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E1DE903-EDFC-4E0F-8EDF-7762FE3C7C80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC02BA18-9235-45CA-A3D6-0EB21CE69DEE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"856FE78A-29B5-4411-98A0-4B0281C17EB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8B59FCD-8161-48EF-844D-8FA1AB2FAA76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DA311B8-D32E-4853-9B07-58EAF1019D0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0F0F679-43C8-426E-A97E-C3B207A3331C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAE6A7F3-3D04-4119-874D-DA2FA86B7BE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA40BC48-D6B5-4424-B306-F99E85EBBCB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C2DF2BB-F94A-4692-AFDC-47C42F04081B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB286B42-E739-46CD-BC96-972CFFAECB0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc8:*:*:*:*:*:*\", \"matchCriteriaId\": \"7636014B-CC2A-43A3-9C9A-04B26AEB06D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc9:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4ED7CE5-3388-4CB9-AF60-A2AF19611327\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"324B5A3E-FA65-4F02-9B8F-872F38CD1808\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C75A8FC4-58D2-4B6A-9D8E-FF12DF52E249\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE21E2AE-9E01-471C-A419-6AB40A49C2F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADFC2D46-65D0-426F-9AF8-8C910AE91D49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11795F8E-7ACD-4597-9194-FC7241DCE057\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60F381E1-F3C5-49BE-B094-4D90E7B108F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D82A6217-CFA6-4E72-8BED-0297E13EABF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CEA1AF2-2DE7-4B38-987D-15FFA70F06B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7954A701-1671-4080-B1E6-47E0208FD28C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63D06512-EAF0-48C6-98F0-066E63FF07EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F35DA6B-C6D4-47CC-97E7-9659DCFDD162\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D75B48F1-623A-4B96-9E08-4AA2DE748490\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26BD805F-08EB-42EC-BC54-26A7278E5089\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"3463B83B-E46F-456E-98BA-801C59AEB337\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8A1A8F2-F892-4EDC-A5DA-1BBD6993E84E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"60EFBFAD-1AF4-49AC-A0E6-A88AB84CD919\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"05FD0767-03F3-416C-AB6D-6BC4A12220B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"8452D554-8DEB-4265-839C-6B40CCFB56B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"94F445F9-57A5-4453-BB5D-290349C04A80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"62C97D20-4152-47C4-B21B-8206CF49E20A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"217715A5-E69D-45C0-B8E4-5681528C651B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A87AD66C-4321-4459-8556-3B0BA38C493A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87A347E0-9C0B-4674-9363-3C36DA27AC45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E0F3DF0-6BD0-4560-9A13-C6493939D8B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4BE1DF7-99CB-416B-B6F9-EC40FBD7D1C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B93AF773-FBB4-4A4A-ADD5-ADA40C24CD36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38A55F08-88A9-42D5-A2B1-8B8C0D6DED09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3975EC77-D33D-4167-91BE-08237C3EE9D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A0F2534-C267-43D9-8365-C00CD979B052\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29:git1:*:*:*:*:*:*\", \"matchCriteriaId\": \"32F95AB2-319C-4BDE-8D34-9FBE69A2FB6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D48FD9D7-E775-4E26-AEBF-01A09C404D6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"89EA3CF3-0AB7-4648-96BA-25E978D2C8C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29:rc2_git7:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E4DB179-F78F-4D36-A47D-557FB1B945DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29:rc8-kk:*:*:*:*:*:*\", \"matchCriteriaId\": \"23859759-4748-4A03-9D78-083C77CFF4AD\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.\"}, {\"lang\": \"es\", \"value\": \"Un desbordamiento de b\\u00fafer en fs/cifs/connect.c en el kernel de Linux v2.6.29 y anteriores permite a atacantes remotos provocar una denegaci\\u00f3n de servicio (mediante ca\\u00edda) a trav\\u00e9s de un campo nativeFileSystem demasiado largo en una respuesta Tree Connect a una petici\\u00f3n de montaje SMB.\"}]", "id": "CVE-2009-1439", "lastModified": "2024-11-21T01:02:27.820", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2009-04-27T18:00:00.377", "references": "[{\"url\": \"http://blog.fefe.de/?ts=b72905a8\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b363b3304bcf68c4541683b2eff70b29f0446a5b\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00002.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.samba.org/archive/linux-cifs-client/2009-April/004322.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/34981\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/35011\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/35120\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/35121\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/35185\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/35217\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/35226\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/35343\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/35387\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/35390\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/35394\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/35656\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/37471\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://wiki.rpath.com/Advisories:rPSA-2009-0084\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1787\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1794\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1800\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2009/04/04/1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2009/04/07/3\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2009/04/07/7\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-1081.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/503610/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/507985/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/34453\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-793-1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3316\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://xorl.wordpress.com/2009/04/07/linux-kernel-tree-connect-cifs-remote-buffer-overflow/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://bugzilla.novell.com/show_bug.cgi?id=492282\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=494275\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10321\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8265\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01126.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01271.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://blog.fefe.de/?ts=b72905a8\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b363b3304bcf68c4541683b2eff70b29f0446a5b\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.samba.org/archive/linux-cifs-client/2009-April/004322.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/34981\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/35011\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/35120\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/35121\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/35185\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/35217\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/35226\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/35343\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/35387\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/35390\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/35394\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/35656\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/37471\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://wiki.rpath.com/Advisories:rPSA-2009-0084\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1787\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1794\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1800\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2009/04/04/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2009/04/07/3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2009/04/07/7\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-1081.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/503610/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/507985/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/34453\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-793-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3316\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://xorl.wordpress.com/2009/04/07/linux-kernel-tree-connect-cifs-remote-buffer-overflow/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.novell.com/show_bug.cgi?id=492282\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=494275\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10321\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8265\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01126.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01271.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2009-1439\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-04-27T18:00:00.377\",\"lastModified\":\"2024-11-21T01:02:27.820\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de b\u00fafer en fs/cifs/connect.c en el kernel de Linux v2.6.29 y anteriores permite a atacantes remotos provocar una denegaci\u00f3n de servicio (mediante ca\u00edda) a trav\u00e9s de un campo nativeFileSystem demasiado largo en una respuesta Tree Connect a una petici\u00f3n de montaje SMB.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.29\",\"matchCriteriaId\":\"3871E973-1DCE-4C2D-8FF0-9330AF928297\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43F9DBB0-8AF7-42CA-95DD-68A344E9D549\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA39D4CE-22F0-46A2-B8CF-4599675E7D3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDD00664-A27C-4514-A2A4-079E8F9B0251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E336C792-B7A1-4318-8050-DE9F03474CEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7228AE50-BACB-4AB8-9CE5-17DB0CD661AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6D260FD-E55E-4A95-AB7F-B880DBE37BAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E36D0159-1A05-4628-9C1C-360DED0F438C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E6654B9-42EB-4C2C-8F71-710D50556180\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FC560CC-F785-42D5-A25B-1BA02E7AC464\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142BCD48-8387-4D0C-A052-44DD4144CBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8220D81-9065-471F-9256-CFE7B9941555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB445E3E-CCBD-4737-BE30-841B9A79D558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D90502F-EC45-4ADC-9428-B94346DA660B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CD39A7A-9172-4B85-B8FE-CEB94207A897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81DE32C2-5B07-4812-9F88-000F5FB000C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02EED3D5-8F89-4B7F-A34B-52274B1A754F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F87AA89-F377-4BEB-B69F-809F5DA6176C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C27AF62E-A026-43E9-89E6-CD807CE9DF51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D343B121-C007-49F8-9DE8-AA05CE58FF0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7936B7EE-9CD1-4698-AD67-C619D0171A88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5738D628-0B2D-4F56-9427-2009BFCB6C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F43EBCB4-FCF4-479A-A44D-D913F7F09C77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860F9225-8A3F-492C-B72B-5EFFB322802C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E23724-2CA4-4211-BB83-38661BE7E6AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6143DC1F-D62E-4DB2-AF43-30A07413D68B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"298266AB-2A36-4606-BF80-2185FC56C4D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C2658CA-56C2-494F-AC42-618EC413CBDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD34526D-F2CC-44C5-991D-B1E41C327860\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F0B900-34E9-4545-B7AE-AF0A4363EACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B36F432D-FED1-4B8D-A458-BEDEEF306AB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25379B32-D898-4E44-A740-978A129B5E05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B90F8F2-9549-413D-9676-3EF634D832B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"915E64EF-6EEC-4DE2-A285-5F3FCE389645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585BEE46-088A-494E-8E18-03F33F6BBEA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFF35478-B292-4A00-B985-CEEDE8B212C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E85846A-61BE-4896-B4A6-42A7E1DBA515\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6E3B925-031D-4F6D-915A-A16F0FFA878C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7344B707-6145-48BA-8BC9-9B140A260BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BFCEA98-C708-4E1E-B189-E6F96D28F07A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B753112-CCDE-4870-AA97-4AAA2946421A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79B3AFE7-F4FF-4144-9046-E5926E305A03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7616E197-ACCA-4191-A513-FD48417C7F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE2F94D-E8E0-4BB7-A910-378012580025\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F5AE3B-B701-4579-B44A-0F7A4267852E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34E60197-56C3-485C-9609-B1C4A0E0FCB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E452E4-45A9-4469-BF69-F40B6598F0EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5751AC4-A60F-42C6-88E5-FC8CFEE6F696\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48777A01-8F36-4752-8F7A-1D1686C69A33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42DA6A18-5AA1-4920-94C6-8D0BB73C5352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51F0211-2D3E-4260-AD63-E83AE4EC4AF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C4E1245-C6BB-462C-9E27-C608595DAE3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"747F1324-AEFA-496F-9447-12CD13114F60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"795C3B17-687E-4F33-AA99-8FEC16F14693\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B81A4DD-2ADE-4455-B517-5E4E0532D5A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BD589CC-666B-4FAA-BCF0-91C484BDDB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD622EE-A840-42E1-B6BF-4AA27D039B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"900D6742-DE0F-45C5-A812-BF84088CB02A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225CA94C-8C84-4FA6-95D0-160A0016FBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D88ED3C4-64C5-44B2-9F23-E16087046C40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03FB31E5-190C-489A-AB30-910D2CC854F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF4A781A-4A41-466F-8426-10B40CF8BA1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ED29B3F-456B-4767-8E59-8C19A3B7E1D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6316369-B54A-4E59-A022-E0610353B284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"073C3CE0-E12D-4545-8460-5A1514271D50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB33DEA-13C7-4B36-AB8A-ED680679A071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86DD0FCC-BB12-410D-8C82-AB99C7C5311E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83700989-8820-48DA-A9FE-6A77DF1E8439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC9F4CEC-7781-468B-B460-4F487B7C6601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67C75A62-8807-4821-9362-1E0D63C0A1B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"894D4812-D62F-489E-8D0E-5E9468CE8EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F92E01-4F08-4364-9E87-FFBC095E32E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9960640-F02D-4E81-A34B-1893D8FD7F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9D00DAD-4F2D-45C7-B87C-85118D9DD855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C398D26-7132-4A6E-9003-77246644451B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EED2DA2-2516-42E9-8A33-0FA64BF51DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF425F00-41BA-4F59-A0DE-6362A1E9A142\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33577E79-1B6E-406D-A49B-2CEF1754F5D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B21D90E-5172-485E-87AC-F1681604AD7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C41F6822-92BF-43F5-8B3E-8BAF9E9A320D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"641EECFD-A985-4026-A53A-10FBE47EAD91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47595F81-2083-4236-A0B0-E2B98DD78402\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F5FC758-5A5D-466A-8386-5FC469F79F66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CCA5C83-5293-4107-8E6A-85F82ECF2C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2D0AADC-BC34-40FB-BD69-37981DC8E971\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CA7EAC4-7696-41CE-8EE9-3E39DE226BD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12547B6B-78F1-4426-81CE-5F208794658C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38429E64-276B-46D4-AACD-05349D6F6615\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E89640F8-313B-4A36-A591-36645D1EF838\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE0271F0-41F2-4096-8C91-DAD1A81AF855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A40DCBB-B41B-468E-A918-6EA3F9A125E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"921B6A54-85E3-4867-8EDF-93EB86BAFBD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8A2C6F1-ED7E-4E51-BE72-BD744D554EE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B004CF1-0ACC-441C-9F61-9B20504F4ECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04B42F06-AC6D-40F3-BC03-5126BED48F36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A8002C7-19E2-4F20-890E-4BA2029174D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34FC90C2-AED0-4EAF-B5E8-DE75961DA26E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7DA9C54-742C-4057-8BAB-18755B4A42D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84BBE8BE-EAE8-4F7A-85BD-94BBF64F30EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53037B40-D534-41D1-9895-8EDB0D884C3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5549096F-C640-463E-AD07-FD8D254CC098\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8DCAF19-879C-42BB-B56A-84504E79758A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8ED186-B0FE-4AAC-9B20-DFAD75D7F677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E86E13B-EC92-47F3-94A9-DB515313011D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C6C01B-4CED-4F37-A415-0603496C27DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC47887B-5608-47BE-85EE-563864461915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF39E62B-EAB4-44B0-A421-2A71B7DD8341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"809264F1-763D-4A8F-B206-222332DD8732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A66ED53E-3139-4972-B027-D614BFFB8628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A3AB7A-1959-4A57-B83D-B2753C43649E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A60B265-5508-4EE0-980A-44BB0966FD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06F0037-DE20-4B4A-977F-BFCFAB026517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1817C772-D367-4ABE-B835-466D31A6DC89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C667B8E4-64EB-4A05-84FF-B2243DEF757D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9484B41A-DFB6-4481-80D8-440C711CEA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D373AF-DE6B-428E-9F0F-F1D220900A4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2975DF7-F916-456C-BF7C-2694559E5282\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"784EB96E-2FD3-4F77-8DB6-4D6C7A928946\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"338BB401-8831-4094-9186-2B3CFA5903D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F6269B-5F6B-4413-B14D-7AE5442E4CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189D1246-F975-4411-A58B-343ED90485FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B914F7F-C6BD-4527-B1E9-7FD1E337A18C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"179147E4-5247-451D-9409-545D661BC158\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6554469E-F6AE-4EB0-880E-CBFD196FEE31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C20367B0-F722-4442-8B59-ABB0FEDB8CC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86A98A70-51E3-4556-8DC4-DD09CF370D1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"469EE3B0-3CC2-4AC2-86A0-2DF34205E707\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC547EB-9308-4477-8256-A0E04B42D6DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6940324-0383-4510-BA55-770E0A6B80B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E3313D5-52E8-49B3-B145-170D9A26DA43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D3A5FD5-4C42-4B00-8473-D5650FAED9C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"480F035A-A59D-4113-A246-DF108BB2F591\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30D39E29-B2A0-4075-84AF-994C27AB0A68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19879317-B067-45DA-B497-21EBDDDC2521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D220C745-28AD-4D04-B2D2-A090D229206E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4AF8895-7BF8-458E-B2BB-68699AABC023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA768A9D-6C63-405E-9D14-5D68F8E93A91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF495E58-DA6C-402D-B381-4929CB8A502B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A591301C-C30F-44AC-90F0-709A18AA96E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7D2606B-00A6-4FA3-A00D-B1E8A80B947C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"610A93BB-70E3-4BF1-83E8-8A7388477F44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"821BD11F-3C6A-4424-BC9B-DFD786248B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F55A024-9F8E-44F8-A0D8-696BC232524A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84595143-3B04-4CE8-81C0-28EEEC58CD0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32EE2B49-DDEB-4B49-A5F0-CAA161095A5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3ABFA33-8FA1-488E-A9BD-1593F495F595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62F6DE3A-E6CC-4D7E-BD08-E43DC4182200\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50B422D1-6C6E-4359-A169-3EED78A1CF40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2F19064-CFBF-4B3C-A0A1-CE62265CD592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB759752-DC19-4750-838B-056063EFDC5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96A43C95-8569-40BE-9E5B-F9B3D0B9D188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99662904-E5E3-4E81-B199-39707EAEB652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615BDD1D-36AA-4976-909B-F0F66BF1090C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE8A26D6-1BDA-45F0-8F7C-F95986050E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61A3EDF2-09D7-4116-AE46-D86E4B9602AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F320FA9F-C13D-4AA3-B838-A0E5D63E6A29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B179CF1D-084D-4B21-956F-E55AC6BDE026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F1B4877-286A-44B5-9C5C-0403F75B2BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"432CA976-6EFA-4D34-B5EA-CD772D067F93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E476195-657E-416E-BC16-44A18B06A133\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A55028-B8F9-4AD2-AE57-A80D561F3C79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C4E641C-67D4-4599-8EFB-0B2F8D81D68C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70460F6C-D6C0-4C1A-B13E-368705EAF223\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F26BA18-08AD-45FE-9F83-25CCB2E27270\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EBFF148-3EDA-4216-910B-8930D8C443C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"648C63F7-EA1D-4F2E-B8AF-1F380C83E542\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1697B855-4834-4633-A5C8-C1F7F13ACE0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FBAE75F-9145-4B9A-A6D8-E488C5326145\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFF566DA-0F04-48DA-AA40-565979C55328\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5990C6C2-2F66-4C4D-8224-74163865F410\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A45A9B9-4B19-4A5B-BC95-BCBC4EF00F12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C23AD176-3B99-4593-BCBD-13C1E579A13E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"034DFD7F-8919-4245-8480-7B272F591271\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CEBC606-6488-48CE-8AA8-5B8CC724D5D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A83C60AF-50A9-480E-860D-45E80AC0A6B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22_rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44FDF616-E410-4540-B377-98D1FB88CE35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22_rc7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5313B736-9904-442A-84D6-8FC7B9AC2059\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E249774-CE05-43D5-A5A3-7CCE24BB2AD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D42BA44-C69B-4170-9867-CABF93CA9BD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5140380C-71BD-464F-AE53-1814C2653056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B18EC0A7-8616-4039-B98B-E1216E035B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22FB141B-FA2A-435D-8937-83FC0669CB20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C59131C8-F66A-4380-9F6E-3FC14C7C8562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5421616-4BF5-4269-8996-C3D2BA6AE2A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23FC6CE2-8717-4558-A309-A441D322F00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"311BE336-7BB2-47C0-AED5-3DEA706C206F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE87D1BC-A72D-42D2-A93C-67A5823BEB14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AAC2E9D-0E82-4866-9046-ADD448418198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"760FB32D-9795-4B29-B79A-A32B5E70F7EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DFF67E9-B0C2-48D5-BB3A-CF21D10010FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5881A78C-D162-4DE5-8353-2BB1EC1F428B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B13D81D2-1A89-4E61-A90C-5E8BB880310B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67F2047A-5F17-4B59-9075-41A5DC5C1CD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F9887E-2466-4C73-A8E1-2117492F9EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FDE5B27-2EF0-464E-8F14-5E809D84D389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"815B2EE8-136F-44E4-997D-5F93A54775DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13673DF5-09B1-40C8-AC54-A447DE8AB01E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"085259B8-9D41-42B0-B32B-66B8D365F106\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A12DE15-E192-4B90-ADB7-A886B3746DD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF6588E7-F4FA-40F5-8945-FC7B6094376E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE87E13E-ACF7-4F74-8938-729F3B0D694C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4965A12-1BBA-4494-A5C1-43E0C0F48C14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52152F5A-1833-4490-A373-9C547B90B0F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B64A095E-5E97-445E-B435-F09983CC0E7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8035F93-9DEE-4B92-ABAA-4ABE0B71BF41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EE92406-DBF3-463E-8A51-F9679E851FDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C60D19B-ED9B-443C-9D49-002ABD381119\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"264C61EE-64F6-43AD-B54F-7D683C29E64F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0149408A-30F6-4EDF-8B3B-CBAB884CE758\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71295664-89EC-4BB3-9F86-B1DDA20FAC5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"6ED1BAE4-A6D3-49A1-BCAD-1E514D42F609\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37BE853A-BA6F-4A70-B166-E34441F0B7DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"4F7C4DFF-616C-497D-9BAB-67C2E21BC21D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85064FDF-4B62-43BF-B36C-F659D739BC22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"E6EBBFE8-2332-45CE-93F8-6815C2AE5D17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEADC505-FF44-4D45-8EA6-B23A1C4564D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"388414A1-C9B4-41BA-AD35-6501A463A095\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CE3C807-5C9B-4B71-868B-DF17ECB1514F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"FDBA01DD-C129-48F1-800B-838418F4A4A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6CADAA2-91D2-40C4-90F3-D7F40A3D4CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"185F1EF8-04EB-43ED-B909-8BDF60F23E76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45B6847C-873B-4BE1-852D-239115E59BA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"D9D4BCAD-B3CD-4FA1-A833-0D7D40289E07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF41209E-D27F-4642-A405-90E822A41897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"3483FAFA-353C-498F-AF68-8F5B84A0F30D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97F59FD9-46E5-4F63-80A0-091AD44D1867\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"B3D5AEA5-210B-4E9F-8D9C-C25B84F15C75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"428844A5-E020-4AE9-8012-9AEDFCB7C32E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"6B11A9E1-9D90-46DC-81B5-17A137205AB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94C9D70D-A552-48D6-9497-EE07EB5649D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"07EEC559-9240-46BE-9057-0F17D1F61F99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF6169FF-9FF9-4A81-BAEB-6D5132F64F61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"BBBC127F-D67E-43FE-BCFE-606C200084F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6DC79CF-A504-4232-9F66-B5DCD0213DA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"42B18945-EE09-4E6B-8C11-E382E5F8F850\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"192B4273-0935-4232-BBFD-A850855CAC5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60E9FDA8-7EC3-4B9B-B508-27F948D60DDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4E4A6E5-0C2C-42FD-B982-684CCB0DDFBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A16F2182-C489-4CA9-A56B-01463148D16F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"630A56D3-7A82-44DE-8888-2EB8CD1C24A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E0D6431-E8E0-4079-A1A0-9CE6D1D67709\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF4EF7A7-6E96-43B4-8287-368098ABBFA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEF91995-A084-422A-A544-30B0B4D75E22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E45F4429-5A9C-4E8B-96EE-CCF19776CABF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"12D0C03A-7D30-485F-8431-638918FE9658\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EFCAF09-BB20-424C-8648-014C0F71F8A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A74970C-5EEA-47A7-A62D-AF98F4D1228F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEA56669-B09E-42C2-9591-245C46909A2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9B33D60-8023-4A0B-ACF7-9F811EEB8BCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D08D180-23F7-456F-98CA-26B53C678D76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E3C363-49C9-4869-83B5-76C14100BFF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E1DE903-EDFC-4E0F-8EDF-7762FE3C7C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC02BA18-9235-45CA-A3D6-0EB21CE69DEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"856FE78A-29B5-4411-98A0-4B0281C17EB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B59FCD-8161-48EF-844D-8FA1AB2FAA76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DA311B8-D32E-4853-9B07-58EAF1019D0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0F0F679-43C8-426E-A97E-C3B207A3331C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAE6A7F3-3D04-4119-874D-DA2FA86B7BE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA40BC48-D6B5-4424-B306-F99E85EBBCB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C2DF2BB-F94A-4692-AFDC-47C42F04081B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB286B42-E739-46CD-BC96-972CFFAECB0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"7636014B-CC2A-43A3-9C9A-04B26AEB06D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc9:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4ED7CE5-3388-4CB9-AF60-A2AF19611327\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"324B5A3E-FA65-4F02-9B8F-872F38CD1808\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C75A8FC4-58D2-4B6A-9D8E-FF12DF52E249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE21E2AE-9E01-471C-A419-6AB40A49C2F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADFC2D46-65D0-426F-9AF8-8C910AE91D49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11795F8E-7ACD-4597-9194-FC7241DCE057\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60F381E1-F3C5-49BE-B094-4D90E7B108F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D82A6217-CFA6-4E72-8BED-0297E13EABF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CEA1AF2-2DE7-4B38-987D-15FFA70F06B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7954A701-1671-4080-B1E6-47E0208FD28C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63D06512-EAF0-48C6-98F0-066E63FF07EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F35DA6B-C6D4-47CC-97E7-9659DCFDD162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D75B48F1-623A-4B96-9E08-4AA2DE748490\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26BD805F-08EB-42EC-BC54-26A7278E5089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3463B83B-E46F-456E-98BA-801C59AEB337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8A1A8F2-F892-4EDC-A5DA-1BBD6993E84E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"60EFBFAD-1AF4-49AC-A0E6-A88AB84CD919\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"05FD0767-03F3-416C-AB6D-6BC4A12220B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"8452D554-8DEB-4265-839C-6B40CCFB56B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"94F445F9-57A5-4453-BB5D-290349C04A80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"62C97D20-4152-47C4-B21B-8206CF49E20A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"217715A5-E69D-45C0-B8E4-5681528C651B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A87AD66C-4321-4459-8556-3B0BA38C493A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87A347E0-9C0B-4674-9363-3C36DA27AC45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E0F3DF0-6BD0-4560-9A13-C6493939D8B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4BE1DF7-99CB-416B-B6F9-EC40FBD7D1C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B93AF773-FBB4-4A4A-ADD5-ADA40C24CD36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38A55F08-88A9-42D5-A2B1-8B8C0D6DED09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3975EC77-D33D-4167-91BE-08237C3EE9D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A0F2534-C267-43D9-8365-C00CD979B052\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:git1:*:*:*:*:*:*\",\"matchCriteriaId\":\"32F95AB2-319C-4BDE-8D34-9FBE69A2FB6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D48FD9D7-E775-4E26-AEBF-01A09C404D6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"89EA3CF3-0AB7-4648-96BA-25E978D2C8C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc2_git7:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E4DB179-F78F-4D36-A47D-557FB1B945DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc8-kk:*:*:*:*:*:*\",\"matchCriteriaId\":\"23859759-4748-4A03-9D78-083C77CFF4AD\"}]}]}],\"references\":[{\"url\":\"http://blog.fefe.de/?ts=b72905a8\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b363b3304bcf68c4541683b2eff70b29f0446a5b\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00002.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.samba.org/archive/linux-cifs-client/2009-April/004322.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/34981\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35011\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35120\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35121\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35185\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35217\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35226\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35343\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35387\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35390\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35394\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35656\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/37471\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2009-0084\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1787\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1794\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1800\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/04/04/1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/04/07/3\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/04/07/7\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1081.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/503610/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/34453\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-793-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://xorl.wordpress.com/2009/04/07/linux-kernel-tree-connect-cifs-remote-buffer-overflow/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.novell.com/show_bug.cgi?id=492282\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=494275\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10321\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8265\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01126.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01271.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://blog.fefe.de/?ts=b72905a8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b363b3304bcf68c4541683b2eff70b29f0446a5b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.samba.org/archive/linux-cifs-client/2009-April/004322.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/34981\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35011\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35120\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35121\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35185\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35217\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35226\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35343\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35387\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35390\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35394\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35656\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/37471\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2009-0084\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1787\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1794\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1800\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/04/04/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/04/07/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/04/07/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1081.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/503610/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/34453\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-793-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://xorl.wordpress.com/2009/04/07/linux-kernel-tree-connect-cifs-remote-buffer-overflow/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.novell.com/show_bug.cgi?id=492282\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=494275\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10321\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8265\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01126.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01271.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
RHSA-2009:1211
Vulnerability from csaf_redhat
Published
2009-08-13 15:30
Modified
2024-11-22 03:00
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix several security issues and several bugs
are now available for Red Hat Enterprise Linux 4.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
These updated packages fix the following security issues:
* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in
the Linux kernel. This driver allowed interfaces using this driver to
receive frames larger than what could be handled. This could lead to a
remote denial of service or code execution. (CVE-2009-1389, Important)
* a buffer overflow flaw was found in the CIFSTCon() function of the Linux
kernel Common Internet File System (CIFS) implementation. When mounting a
CIFS share, a malicious server could send an overly-long string to the
client, possibly leading to a denial of service or privilege escalation on
the client mounting the CIFS share. (CVE-2009-1439, Important)
* several flaws were found in the way the Linux kernel CIFS implementation
handles Unicode strings. CIFS clients convert Unicode strings sent by a
server to their local character sets, and then write those strings into
memory. If a malicious server sent a long enough string, it could write
past the end of the target memory region and corrupt other memory areas,
possibly leading to a denial of service or privilege escalation on the
client mounting the CIFS share. (CVE-2009-1633, Important)
These updated packages also fix the following bugs:
* when using network bonding in the "balance-tlb" or "balance-alb" mode,
the primary setting for the primary slave device was lost when said
device was brought down (ifdown). Bringing the slave interface back up
(ifup) did not restore the primary setting (the device was not made the
active slave). (BZ#507563)
* a bug in timer_interrupt() may have caused the system time to move up to
two days or more into the future, or to be delayed for several minutes.
This bug only affected Intel 64 and AMD64 systems that have the High
Precision Event Timer (HPET) enabled in the BIOS, and could have caused
problems for applications that require timing to be accurate. (BZ#508835)
* a race condition was resolved in the Linux kernel block layer between
show_partition() and rescan_partitions(). This could have caused a NULL
pointer dereference in show_partition(), leading to a system crash (kernel
panic). This issue was most likely to occur on systems running monitoring
software that regularly scanned hard disk partitions, or from repeatedly
running commands that probe for partition information. (BZ#512310)
* previously, the Stratus memory tracker missed certain modified pages.
With this update, information about the type of page (small page or
huge page) is passed to the Stratus memory tracker, which resolves this
issue. The fix for this issue does not affect systems that do not use
memory tracking. (BZ#513182)
* a bug may have caused a system crash when using the cciss driver, due to
an uninitialized kernel structure. A reported case of this issue occurred
after issuing consecutive SCSI TUR commands (sg_turs sends SCSI
test-unit-ready commands in a loop). (BZ#513189)
* a bug in the SCSI implementation caused "Aborted Command - internal
target failure" errors to be sent to Device-Mapper Multipath, without
retries, resulting in Device-Mapper Multipath marking the path as failed
and making a path group switch. With this update, all errors that return a
sense key in the SCSI mid layer (including "Aborted Command - internal
target failure") are retried. (BZ#514007)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than what could be handled. This could lead to a\nremote denial of service or code execution. (CVE-2009-1389, Important)\n\n* a buffer overflow flaw was found in the CIFSTCon() function of the Linux\nkernel Common Internet File System (CIFS) implementation. When mounting a\nCIFS share, a malicious server could send an overly-long string to the\nclient, possibly leading to a denial of service or privilege escalation on\nthe client mounting the CIFS share. (CVE-2009-1439, Important)\n\n* several flaws were found in the way the Linux kernel CIFS implementation\nhandles Unicode strings. CIFS clients convert Unicode strings sent by a\nserver to their local character sets, and then write those strings into\nmemory. If a malicious server sent a long enough string, it could write\npast the end of the target memory region and corrupt other memory areas,\npossibly leading to a denial of service or privilege escalation on the\nclient mounting the CIFS share. (CVE-2009-1633, Important)\n\nThese updated packages also fix the following bugs:\n\n* when using network bonding in the \"balance-tlb\" or \"balance-alb\" mode,\nthe primary setting for the primary slave device was lost when said\ndevice was brought down (ifdown). Bringing the slave interface back up\n(ifup) did not restore the primary setting (the device was not made the\nactive slave). (BZ#507563)\n\n* a bug in timer_interrupt() may have caused the system time to move up to\ntwo days or more into the future, or to be delayed for several minutes.\nThis bug only affected Intel 64 and AMD64 systems that have the High\nPrecision Event Timer (HPET) enabled in the BIOS, and could have caused\nproblems for applications that require timing to be accurate. (BZ#508835)\n\n* a race condition was resolved in the Linux kernel block layer between\nshow_partition() and rescan_partitions(). This could have caused a NULL\npointer dereference in show_partition(), leading to a system crash (kernel\npanic). This issue was most likely to occur on systems running monitoring\nsoftware that regularly scanned hard disk partitions, or from repeatedly\nrunning commands that probe for partition information. (BZ#512310)\n\n* previously, the Stratus memory tracker missed certain modified pages.\nWith this update, information about the type of page (small page or\nhuge page) is passed to the Stratus memory tracker, which resolves this\nissue. The fix for this issue does not affect systems that do not use\nmemory tracking. (BZ#513182)\n\n* a bug may have caused a system crash when using the cciss driver, due to\nan uninitialized kernel structure. A reported case of this issue occurred\nafter issuing consecutive SCSI TUR commands (sg_turs sends SCSI\ntest-unit-ready commands in a loop). (BZ#513189)\n\n* a bug in the SCSI implementation caused \"Aborted Command - internal\ntarget failure\" errors to be sent to Device-Mapper Multipath, without\nretries, resulting in Device-Mapper Multipath marking the path as failed\nand making a path group switch. With this update, all errors that return a\nsense key in the SCSI mid layer (including \"Aborted Command - internal\ntarget failure\") are retried. (BZ#514007)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1211", "url": "https://access.redhat.com/errata/RHSA-2009:1211" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "496572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572" }, { "category": "external", "summary": "504726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726" }, { "category": "external", "summary": "507563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=507563" }, { "category": "external", "summary": "508835", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=508835" }, { "category": "external", "summary": "512310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512310" }, { "category": "external", "summary": "513182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513182" }, { "category": "external", "summary": "513189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513189" }, { "category": "external", "summary": "514007", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=514007" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1211.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T03:00:31+00:00", "generator": { "date": "2024-11-22T03:00:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1211", "initial_release_date": "2009-08-13T15:30:00+00:00", "revision_history": [ { "date": "2009-08-13T15:30:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-08-13T11:34:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:00:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-devel-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-xenU-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-smp-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.7.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64", "product_id": "kernel-devel-0:2.6.9-89.0.7.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.7.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.ia64", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.ia64", "product_id": "kernel-0:2.6.9-89.0.7.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "product_id": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.7.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.7.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch", "product_id": "kernel-doc-0:2.6.9-89.0.7.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.0.7.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.src", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.src", "product_id": "kernel-0:2.6.9-89.0.7.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.7.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.ppc64", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64", "product_id": "kernel-0:2.6.9-89.0.7.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "product_id": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.7.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x", "product_id": "kernel-devel-0:2.6.9-89.0.7.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.s390x", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.s390x", "product_id": "kernel-0:2.6.9-89.0.7.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390", "product_id": "kernel-devel-0:2.6.9-89.0.7.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.s390", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.s390", "product_id": "kernel-0:2.6.9-89.0.7.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.7.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.7.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.7.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.7.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-1389", "discovery_date": "2009-06-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "504726" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: r8169: fix crash when large packets are received", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1389" }, { "category": "external", "summary": "RHBZ#504726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389" } ], "release_date": "2009-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-13T15:30:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1211" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: r8169: fix crash when large packets are received" }, { "cve": "CVE-2009-1439", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "494275" } ], "notes": [ { "category": "description", "text": "Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1439" }, { "category": "external", "summary": "RHBZ#494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1439", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439" } ], "release_date": "2009-03-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-13T15:30:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1211" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount" }, { "cve": "CVE-2009-1633", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-04-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "496572" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1633" }, { "category": "external", "summary": "RHBZ#496572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1633", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633" } ], "release_date": "2009-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-13T15:30:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1211" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server" } ] }
rhsa-2009:1106
Vulnerability from csaf_redhat
Published
2009-06-16 21:21
Modified
2024-11-22 02:59
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix several security issues and several bugs
are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security fixes:
* several flaws were found in the way the Linux kernel CIFS implementation
handles Unicode strings. CIFS clients convert Unicode strings sent by a
server to their local character sets, and then write those strings into
memory. If a malicious server sent a long enough string, it could write
past the end of the target memory region and corrupt other memory areas,
possibly leading to a denial of service or privilege escalation on the
client mounting the CIFS share. (CVE-2009-1439, CVE-2009-1633, Important)
* the Linux kernel Network File System daemon (nfsd) implementation did not
drop the CAP_MKNOD capability when handling requests from local,
unprivileged users. This flaw could possibly lead to an information leak or
privilege escalation. (CVE-2009-1072, Moderate)
* Frank Filz reported the NFSv4 client was missing a file permission check
for the execute bit in some situations. This could allow local,
unprivileged users to run non-executable files on NFSv4 mounted file
systems. (CVE-2009-1630, Moderate)
* a missing check was found in the hypervisor_callback() function in the
Linux kernel provided by the kernel-xen package. This could cause a denial
of service of a 32-bit guest if an application running in that guest
accesses a certain memory location in the kernel. (CVE-2009-1758, Moderate)
* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and
agp_generic_alloc_pages() functions did not zero out the memory pages they
allocate, which may later be available to user-space processes. This flaw
could possibly lead to an information leak. (CVE-2009-1192, Low)
Bug fixes:
* a race in the NFS client between destroying cached access rights and
unmounting an NFS file system could have caused a system crash. "Busy
inodes" messages may have been logged. (BZ#498653)
* nanosleep() could sleep several milliseconds less than the specified time
on Intel Itanium®-based systems. (BZ#500349)
* LEDs for disk drives in AHCI mode may have displayed a fault state when
there were no faults. (BZ#500120)
* ptrace_do_wait() reported tasks were stopped each time the process doing
the trace called wait(), instead of reporting it once. (BZ#486945)
* epoll_wait() may have caused a system lockup and problems for
applications. (BZ#497322)
* missing capabilities could possibly allow users with an fsuid other than
0 to perform actions on some file system types that would otherwise be
prevented. (BZ#497271)
* on NFS mounted file systems, heavy write loads may have blocked
nfs_getattr() for long periods, causing commands that use stat(2), such as
ls, to hang. (BZ#486926)
* in rare circumstances, if an application performed multiple O_DIRECT
reads per virtual memory page and also performed fork(2), the buffer
storing the result of the I/O may have ended up with invalid data.
(BZ#486921)
* when using GFS2, gfs2_quotad may have entered an uninterpretable sleep
state. (BZ#501742)
* with this update, get_random_int() is more random and no longer uses a
common seed value, reducing the possibility of predicting the values
returned. (BZ#499783)
* the "-fwrapv" flag was added to the gcc build options to prevent gcc from
optimizing away wrapping. (BZ#501751)
* a kernel panic when enabling and disabling iSCSI paths. (BZ#502916)
* using the Broadcom NetXtreme BCM5704 network device with the tg3 driver
caused high system load and very bad performance. (BZ#502837)
* "/proc/[pid]/maps" and "/proc/[pid]/smaps" can only be read by processes
able to use the ptrace() call on a given process; however, certain
information from "/proc/[pid]/stat" and "/proc/[pid]/wchan" could be used
to reconstruct memory maps. (BZ#499546)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* several flaws were found in the way the Linux kernel CIFS implementation\nhandles Unicode strings. CIFS clients convert Unicode strings sent by a\nserver to their local character sets, and then write those strings into\nmemory. If a malicious server sent a long enough string, it could write\npast the end of the target memory region and corrupt other memory areas,\npossibly leading to a denial of service or privilege escalation on the\nclient mounting the CIFS share. (CVE-2009-1439, CVE-2009-1633, Important)\n\n* the Linux kernel Network File System daemon (nfsd) implementation did not\ndrop the CAP_MKNOD capability when handling requests from local,\nunprivileged users. This flaw could possibly lead to an information leak or\nprivilege escalation. (CVE-2009-1072, Moderate)\n\n* Frank Filz reported the NFSv4 client was missing a file permission check\nfor the execute bit in some situations. This could allow local,\nunprivileged users to run non-executable files on NFSv4 mounted file\nsystems. (CVE-2009-1630, Moderate)\n\n* a missing check was found in the hypervisor_callback() function in the\nLinux kernel provided by the kernel-xen package. This could cause a denial\nof service of a 32-bit guest if an application running in that guest\naccesses a certain memory location in the kernel. (CVE-2009-1758, Moderate)\n\n* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and\nagp_generic_alloc_pages() functions did not zero out the memory pages they\nallocate, which may later be available to user-space processes. This flaw\ncould possibly lead to an information leak. (CVE-2009-1192, Low)\n\nBug fixes:\n\n* a race in the NFS client between destroying cached access rights and\nunmounting an NFS file system could have caused a system crash. \"Busy\ninodes\" messages may have been logged. (BZ#498653)\n\n* nanosleep() could sleep several milliseconds less than the specified time\non Intel Itanium\u00ae-based systems. (BZ#500349)\n\n* LEDs for disk drives in AHCI mode may have displayed a fault state when\nthere were no faults. (BZ#500120)\n\n* ptrace_do_wait() reported tasks were stopped each time the process doing\nthe trace called wait(), instead of reporting it once. (BZ#486945)\n\n* epoll_wait() may have caused a system lockup and problems for\napplications. (BZ#497322)\n\n* missing capabilities could possibly allow users with an fsuid other than\n0 to perform actions on some file system types that would otherwise be\nprevented. (BZ#497271)\n\n* on NFS mounted file systems, heavy write loads may have blocked\nnfs_getattr() for long periods, causing commands that use stat(2), such as\nls, to hang. (BZ#486926)\n\n* in rare circumstances, if an application performed multiple O_DIRECT\nreads per virtual memory page and also performed fork(2), the buffer\nstoring the result of the I/O may have ended up with invalid data.\n(BZ#486921)\n\n* when using GFS2, gfs2_quotad may have entered an uninterpretable sleep\nstate. (BZ#501742)\n\n* with this update, get_random_int() is more random and no longer uses a\ncommon seed value, reducing the possibility of predicting the values\nreturned. (BZ#499783)\n\n* the \"-fwrapv\" flag was added to the gcc build options to prevent gcc from\noptimizing away wrapping. (BZ#501751)\n\n* a kernel panic when enabling and disabling iSCSI paths. (BZ#502916)\n\n* using the Broadcom NetXtreme BCM5704 network device with the tg3 driver\ncaused high system load and very bad performance. (BZ#502837)\n\n* \"/proc/[pid]/maps\" and \"/proc/[pid]/smaps\" can only be read by processes\nable to use the ptrace() call on a given process; however, certain\ninformation from \"/proc/[pid]/stat\" and \"/proc/[pid]/wchan\" could be used\nto reconstruct memory maps. (BZ#499546)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1106", "url": "https://access.redhat.com/errata/RHSA-2009:1106" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "486921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486921" }, { "category": "external", "summary": "486926", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486926" }, { "category": "external", "summary": "486945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486945" }, { "category": "external", "summary": "491572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572" }, { "category": "external", "summary": "494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "496572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572" }, { "category": "external", "summary": "497020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020" }, { "category": "external", "summary": "497322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497322" }, { "category": "external", "summary": "498653", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=498653" }, { "category": "external", "summary": "499546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499546" }, { "category": "external", "summary": "500120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500120" }, { "category": "external", "summary": "500297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297" }, { "category": "external", "summary": "500349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500349" }, { "category": "external", "summary": "500945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500945" }, { "category": "external", "summary": "501742", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501742" }, { "category": "external", "summary": "501751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501751" }, { "category": "external", "summary": "502837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502837" }, { "category": "external", "summary": "502916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502916" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1106.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T02:59:29+00:00", "generator": { "date": "2024-11-22T02:59:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1106", "initial_release_date": "2009-06-16T21:21:00+00:00", "revision_history": [ { "date": "2009-06-16T21:21:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-06-16T18:34:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:59:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.14.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.14.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.src", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.src", "product_id": "kernel-0:2.6.18-128.1.14.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "product_id": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-128.1.14.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.14.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.1.14.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.1.14.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.src" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-128.1.14.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.src" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-128.1.14.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-1072", "discovery_date": "2009-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "491572" } ], "notes": [ { "category": "description", "text": "nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfsd should drop CAP_MKNOD for non-root", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 2.1 and 3, due to these products being in Production 3 of their maintenance life-cycles, where only qualified security errata of important or critical impact are addressed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1072" }, { "category": "external", "summary": "RHBZ#491572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1072", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072" } ], "release_date": "2009-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfsd should drop CAP_MKNOD for non-root" }, { "cve": "CVE-2009-1192", "discovery_date": "2009-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "497020" } ], "notes": [ { "category": "description", "text": "The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: agp: zero pages before sending to userspace", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1192" }, { "category": "external", "summary": "RHBZ#497020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1192", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192" } ], "release_date": "2009-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: agp: zero pages before sending to userspace" }, { "cve": "CVE-2009-1439", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "494275" } ], "notes": [ { "category": "description", "text": "Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1439" }, { "category": "external", "summary": "RHBZ#494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1439", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439" } ], "release_date": "2009-03-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount" }, { "cve": "CVE-2009-1630", "discovery_date": "2009-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "500297" } ], "notes": [ { "category": "description", "text": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1630" }, { "category": "external", "summary": "RHBZ#500297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1630", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630" } ], "release_date": "2009-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission" }, { "cve": "CVE-2009-1633", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-04-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "496572" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1633" }, { "category": "external", "summary": "RHBZ#496572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1633", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633" } ], "release_date": "2009-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server" }, { "cve": "CVE-2009-1758", "discovery_date": "2009-05-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "500945" } ], "notes": [ { "category": "description", "text": "The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in \"certain address ranges.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xen: local denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and Red Hat Enterprise MRG.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1758" }, { "category": "external", "summary": "RHBZ#500945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1758", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1758" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1758", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1758" } ], "release_date": "2009-05-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: xen: local denial of service" }, { "cve": "CVE-2009-3238", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "discovery_date": "2009-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "524512" } ], "notes": [ { "category": "description", "text": "The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function\u0027s tendency to \"return the same value over and over again for long stretches of time.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: random: add robust get_random_u32, remove weak get_random_int", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3238" }, { "category": "external", "summary": "RHBZ#524512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524512" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3238", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3238" } ], "release_date": "2009-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: random: add robust get_random_u32, remove weak get_random_int" } ] }
rhsa-2009_1211
Vulnerability from csaf_redhat
Published
2009-08-13 15:30
Modified
2024-11-22 03:00
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix several security issues and several bugs
are now available for Red Hat Enterprise Linux 4.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
These updated packages fix the following security issues:
* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in
the Linux kernel. This driver allowed interfaces using this driver to
receive frames larger than what could be handled. This could lead to a
remote denial of service or code execution. (CVE-2009-1389, Important)
* a buffer overflow flaw was found in the CIFSTCon() function of the Linux
kernel Common Internet File System (CIFS) implementation. When mounting a
CIFS share, a malicious server could send an overly-long string to the
client, possibly leading to a denial of service or privilege escalation on
the client mounting the CIFS share. (CVE-2009-1439, Important)
* several flaws were found in the way the Linux kernel CIFS implementation
handles Unicode strings. CIFS clients convert Unicode strings sent by a
server to their local character sets, and then write those strings into
memory. If a malicious server sent a long enough string, it could write
past the end of the target memory region and corrupt other memory areas,
possibly leading to a denial of service or privilege escalation on the
client mounting the CIFS share. (CVE-2009-1633, Important)
These updated packages also fix the following bugs:
* when using network bonding in the "balance-tlb" or "balance-alb" mode,
the primary setting for the primary slave device was lost when said
device was brought down (ifdown). Bringing the slave interface back up
(ifup) did not restore the primary setting (the device was not made the
active slave). (BZ#507563)
* a bug in timer_interrupt() may have caused the system time to move up to
two days or more into the future, or to be delayed for several minutes.
This bug only affected Intel 64 and AMD64 systems that have the High
Precision Event Timer (HPET) enabled in the BIOS, and could have caused
problems for applications that require timing to be accurate. (BZ#508835)
* a race condition was resolved in the Linux kernel block layer between
show_partition() and rescan_partitions(). This could have caused a NULL
pointer dereference in show_partition(), leading to a system crash (kernel
panic). This issue was most likely to occur on systems running monitoring
software that regularly scanned hard disk partitions, or from repeatedly
running commands that probe for partition information. (BZ#512310)
* previously, the Stratus memory tracker missed certain modified pages.
With this update, information about the type of page (small page or
huge page) is passed to the Stratus memory tracker, which resolves this
issue. The fix for this issue does not affect systems that do not use
memory tracking. (BZ#513182)
* a bug may have caused a system crash when using the cciss driver, due to
an uninitialized kernel structure. A reported case of this issue occurred
after issuing consecutive SCSI TUR commands (sg_turs sends SCSI
test-unit-ready commands in a loop). (BZ#513189)
* a bug in the SCSI implementation caused "Aborted Command - internal
target failure" errors to be sent to Device-Mapper Multipath, without
retries, resulting in Device-Mapper Multipath marking the path as failed
and making a path group switch. With this update, all errors that return a
sense key in the SCSI mid layer (including "Aborted Command - internal
target failure") are retried. (BZ#514007)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than what could be handled. This could lead to a\nremote denial of service or code execution. (CVE-2009-1389, Important)\n\n* a buffer overflow flaw was found in the CIFSTCon() function of the Linux\nkernel Common Internet File System (CIFS) implementation. When mounting a\nCIFS share, a malicious server could send an overly-long string to the\nclient, possibly leading to a denial of service or privilege escalation on\nthe client mounting the CIFS share. (CVE-2009-1439, Important)\n\n* several flaws were found in the way the Linux kernel CIFS implementation\nhandles Unicode strings. CIFS clients convert Unicode strings sent by a\nserver to their local character sets, and then write those strings into\nmemory. If a malicious server sent a long enough string, it could write\npast the end of the target memory region and corrupt other memory areas,\npossibly leading to a denial of service or privilege escalation on the\nclient mounting the CIFS share. (CVE-2009-1633, Important)\n\nThese updated packages also fix the following bugs:\n\n* when using network bonding in the \"balance-tlb\" or \"balance-alb\" mode,\nthe primary setting for the primary slave device was lost when said\ndevice was brought down (ifdown). Bringing the slave interface back up\n(ifup) did not restore the primary setting (the device was not made the\nactive slave). (BZ#507563)\n\n* a bug in timer_interrupt() may have caused the system time to move up to\ntwo days or more into the future, or to be delayed for several minutes.\nThis bug only affected Intel 64 and AMD64 systems that have the High\nPrecision Event Timer (HPET) enabled in the BIOS, and could have caused\nproblems for applications that require timing to be accurate. (BZ#508835)\n\n* a race condition was resolved in the Linux kernel block layer between\nshow_partition() and rescan_partitions(). This could have caused a NULL\npointer dereference in show_partition(), leading to a system crash (kernel\npanic). This issue was most likely to occur on systems running monitoring\nsoftware that regularly scanned hard disk partitions, or from repeatedly\nrunning commands that probe for partition information. (BZ#512310)\n\n* previously, the Stratus memory tracker missed certain modified pages.\nWith this update, information about the type of page (small page or\nhuge page) is passed to the Stratus memory tracker, which resolves this\nissue. The fix for this issue does not affect systems that do not use\nmemory tracking. (BZ#513182)\n\n* a bug may have caused a system crash when using the cciss driver, due to\nan uninitialized kernel structure. A reported case of this issue occurred\nafter issuing consecutive SCSI TUR commands (sg_turs sends SCSI\ntest-unit-ready commands in a loop). (BZ#513189)\n\n* a bug in the SCSI implementation caused \"Aborted Command - internal\ntarget failure\" errors to be sent to Device-Mapper Multipath, without\nretries, resulting in Device-Mapper Multipath marking the path as failed\nand making a path group switch. With this update, all errors that return a\nsense key in the SCSI mid layer (including \"Aborted Command - internal\ntarget failure\") are retried. (BZ#514007)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1211", "url": "https://access.redhat.com/errata/RHSA-2009:1211" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "496572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572" }, { "category": "external", "summary": "504726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726" }, { "category": "external", "summary": "507563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=507563" }, { "category": "external", "summary": "508835", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=508835" }, { "category": "external", "summary": "512310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512310" }, { "category": "external", "summary": "513182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513182" }, { "category": "external", "summary": "513189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513189" }, { "category": "external", "summary": "514007", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=514007" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1211.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T03:00:31+00:00", "generator": { "date": "2024-11-22T03:00:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1211", "initial_release_date": "2009-08-13T15:30:00+00:00", "revision_history": [ { "date": "2009-08-13T15:30:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-08-13T11:34:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:00:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-devel-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-xenU-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-smp-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.7.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64", "product_id": "kernel-devel-0:2.6.9-89.0.7.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.7.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.ia64", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.ia64", "product_id": "kernel-0:2.6.9-89.0.7.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "product_id": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.7.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.7.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch", "product_id": "kernel-doc-0:2.6.9-89.0.7.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.0.7.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.src", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.src", "product_id": "kernel-0:2.6.9-89.0.7.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.7.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.ppc64", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64", "product_id": "kernel-0:2.6.9-89.0.7.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "product_id": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.7.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x", "product_id": "kernel-devel-0:2.6.9-89.0.7.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.s390x", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.s390x", "product_id": "kernel-0:2.6.9-89.0.7.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390", "product_id": "kernel-devel-0:2.6.9-89.0.7.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.s390", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.s390", "product_id": "kernel-0:2.6.9-89.0.7.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.7.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.7.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.7.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.7.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-1389", "discovery_date": "2009-06-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "504726" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: r8169: fix crash when large packets are received", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1389" }, { "category": "external", "summary": "RHBZ#504726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389" } ], "release_date": "2009-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-13T15:30:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1211" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: r8169: fix crash when large packets are received" }, { "cve": "CVE-2009-1439", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "494275" } ], "notes": [ { "category": "description", "text": "Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1439" }, { "category": "external", "summary": "RHBZ#494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1439", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439" } ], "release_date": "2009-03-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-13T15:30:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1211" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount" }, { "cve": "CVE-2009-1633", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-04-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "496572" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1633" }, { "category": "external", "summary": "RHBZ#496572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1633", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633" } ], "release_date": "2009-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-13T15:30:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1211" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server" } ] }
rhsa-2009:1211
Vulnerability from csaf_redhat
Published
2009-08-13 15:30
Modified
2024-11-22 03:00
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix several security issues and several bugs
are now available for Red Hat Enterprise Linux 4.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
These updated packages fix the following security issues:
* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in
the Linux kernel. This driver allowed interfaces using this driver to
receive frames larger than what could be handled. This could lead to a
remote denial of service or code execution. (CVE-2009-1389, Important)
* a buffer overflow flaw was found in the CIFSTCon() function of the Linux
kernel Common Internet File System (CIFS) implementation. When mounting a
CIFS share, a malicious server could send an overly-long string to the
client, possibly leading to a denial of service or privilege escalation on
the client mounting the CIFS share. (CVE-2009-1439, Important)
* several flaws were found in the way the Linux kernel CIFS implementation
handles Unicode strings. CIFS clients convert Unicode strings sent by a
server to their local character sets, and then write those strings into
memory. If a malicious server sent a long enough string, it could write
past the end of the target memory region and corrupt other memory areas,
possibly leading to a denial of service or privilege escalation on the
client mounting the CIFS share. (CVE-2009-1633, Important)
These updated packages also fix the following bugs:
* when using network bonding in the "balance-tlb" or "balance-alb" mode,
the primary setting for the primary slave device was lost when said
device was brought down (ifdown). Bringing the slave interface back up
(ifup) did not restore the primary setting (the device was not made the
active slave). (BZ#507563)
* a bug in timer_interrupt() may have caused the system time to move up to
two days or more into the future, or to be delayed for several minutes.
This bug only affected Intel 64 and AMD64 systems that have the High
Precision Event Timer (HPET) enabled in the BIOS, and could have caused
problems for applications that require timing to be accurate. (BZ#508835)
* a race condition was resolved in the Linux kernel block layer between
show_partition() and rescan_partitions(). This could have caused a NULL
pointer dereference in show_partition(), leading to a system crash (kernel
panic). This issue was most likely to occur on systems running monitoring
software that regularly scanned hard disk partitions, or from repeatedly
running commands that probe for partition information. (BZ#512310)
* previously, the Stratus memory tracker missed certain modified pages.
With this update, information about the type of page (small page or
huge page) is passed to the Stratus memory tracker, which resolves this
issue. The fix for this issue does not affect systems that do not use
memory tracking. (BZ#513182)
* a bug may have caused a system crash when using the cciss driver, due to
an uninitialized kernel structure. A reported case of this issue occurred
after issuing consecutive SCSI TUR commands (sg_turs sends SCSI
test-unit-ready commands in a loop). (BZ#513189)
* a bug in the SCSI implementation caused "Aborted Command - internal
target failure" errors to be sent to Device-Mapper Multipath, without
retries, resulting in Device-Mapper Multipath marking the path as failed
and making a path group switch. With this update, all errors that return a
sense key in the SCSI mid layer (including "Aborted Command - internal
target failure") are retried. (BZ#514007)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than what could be handled. This could lead to a\nremote denial of service or code execution. (CVE-2009-1389, Important)\n\n* a buffer overflow flaw was found in the CIFSTCon() function of the Linux\nkernel Common Internet File System (CIFS) implementation. When mounting a\nCIFS share, a malicious server could send an overly-long string to the\nclient, possibly leading to a denial of service or privilege escalation on\nthe client mounting the CIFS share. (CVE-2009-1439, Important)\n\n* several flaws were found in the way the Linux kernel CIFS implementation\nhandles Unicode strings. CIFS clients convert Unicode strings sent by a\nserver to their local character sets, and then write those strings into\nmemory. If a malicious server sent a long enough string, it could write\npast the end of the target memory region and corrupt other memory areas,\npossibly leading to a denial of service or privilege escalation on the\nclient mounting the CIFS share. (CVE-2009-1633, Important)\n\nThese updated packages also fix the following bugs:\n\n* when using network bonding in the \"balance-tlb\" or \"balance-alb\" mode,\nthe primary setting for the primary slave device was lost when said\ndevice was brought down (ifdown). Bringing the slave interface back up\n(ifup) did not restore the primary setting (the device was not made the\nactive slave). (BZ#507563)\n\n* a bug in timer_interrupt() may have caused the system time to move up to\ntwo days or more into the future, or to be delayed for several minutes.\nThis bug only affected Intel 64 and AMD64 systems that have the High\nPrecision Event Timer (HPET) enabled in the BIOS, and could have caused\nproblems for applications that require timing to be accurate. (BZ#508835)\n\n* a race condition was resolved in the Linux kernel block layer between\nshow_partition() and rescan_partitions(). This could have caused a NULL\npointer dereference in show_partition(), leading to a system crash (kernel\npanic). This issue was most likely to occur on systems running monitoring\nsoftware that regularly scanned hard disk partitions, or from repeatedly\nrunning commands that probe for partition information. (BZ#512310)\n\n* previously, the Stratus memory tracker missed certain modified pages.\nWith this update, information about the type of page (small page or\nhuge page) is passed to the Stratus memory tracker, which resolves this\nissue. The fix for this issue does not affect systems that do not use\nmemory tracking. (BZ#513182)\n\n* a bug may have caused a system crash when using the cciss driver, due to\nan uninitialized kernel structure. A reported case of this issue occurred\nafter issuing consecutive SCSI TUR commands (sg_turs sends SCSI\ntest-unit-ready commands in a loop). (BZ#513189)\n\n* a bug in the SCSI implementation caused \"Aborted Command - internal\ntarget failure\" errors to be sent to Device-Mapper Multipath, without\nretries, resulting in Device-Mapper Multipath marking the path as failed\nand making a path group switch. With this update, all errors that return a\nsense key in the SCSI mid layer (including \"Aborted Command - internal\ntarget failure\") are retried. (BZ#514007)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1211", "url": "https://access.redhat.com/errata/RHSA-2009:1211" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "496572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572" }, { "category": "external", "summary": "504726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726" }, { "category": "external", "summary": "507563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=507563" }, { "category": "external", "summary": "508835", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=508835" }, { "category": "external", "summary": "512310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512310" }, { "category": "external", "summary": "513182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513182" }, { "category": "external", "summary": "513189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513189" }, { "category": "external", "summary": "514007", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=514007" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1211.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T03:00:31+00:00", "generator": { "date": "2024-11-22T03:00:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1211", "initial_release_date": "2009-08-13T15:30:00+00:00", "revision_history": [ { "date": "2009-08-13T15:30:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-08-13T11:34:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:00:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-devel-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-xenU-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-smp-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.7.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64", "product_id": "kernel-devel-0:2.6.9-89.0.7.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.7.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.ia64", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.ia64", "product_id": "kernel-0:2.6.9-89.0.7.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "product_id": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.7.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.7.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch", "product_id": "kernel-doc-0:2.6.9-89.0.7.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.0.7.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.src", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.src", "product_id": "kernel-0:2.6.9-89.0.7.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.7.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.ppc64", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64", "product_id": "kernel-0:2.6.9-89.0.7.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "product_id": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.7.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x", "product_id": "kernel-devel-0:2.6.9-89.0.7.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.s390x", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.s390x", "product_id": "kernel-0:2.6.9-89.0.7.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390", "product_id": "kernel-devel-0:2.6.9-89.0.7.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.7.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.7.EL.s390", "product": { "name": "kernel-0:2.6.9-89.0.7.EL.s390", "product_id": "kernel-0:2.6.9-89.0.7.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.7.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.7.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.7.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.7.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.7.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.7.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.7.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-1389", "discovery_date": "2009-06-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "504726" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: r8169: fix crash when large packets are received", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1389" }, { "category": "external", "summary": "RHBZ#504726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389" } ], "release_date": "2009-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-13T15:30:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1211" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: r8169: fix crash when large packets are received" }, { "cve": "CVE-2009-1439", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "494275" } ], "notes": [ { "category": "description", "text": "Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1439" }, { "category": "external", "summary": "RHBZ#494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1439", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439" } ], "release_date": "2009-03-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-13T15:30:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1211" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount" }, { "cve": "CVE-2009-1633", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-04-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "496572" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1633" }, { "category": "external", "summary": "RHBZ#496572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1633", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633" } ], "release_date": "2009-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-13T15:30:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1211" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-0:2.6.9-89.0.7.EL.src", "4AS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.7.EL.src", "4Desktop:kernel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-0:2.6.9-89.0.7.EL.src", "4ES:kernel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-0:2.6.9-89.0.7.EL.src", "4WS:kernel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.7.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server" } ] }
rhsa-2009_1081
Vulnerability from csaf_redhat
Published
2009-06-03 15:36
Modified
2024-11-22 02:59
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
Updated kernel-rt packages that fix several security issues and various
bugs are now available for Red Hat Enterprise MRG 1.1.3.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel-rt packages contain the Linux kernel, the core of any Linux
operating system.
These updated packages fix the following security issues:
* a buffer overflow flaw was found in the CIFSTCon() function of the Linux
kernel Common Internet File System (CIFS) implementation. When mounting a
CIFS share, a malicious server could send an overly-long string to the
client, possibly leading to a denial of service or privilege escalation on
the client mounting the CIFS share. (CVE-2009-1439, Important)
* the Linux kernel Network File System daemon (nfsd) implementation did not
drop the CAP_MKNOD capability when handling requests from local,
unprivileged users. This flaw could possibly lead to an information leak or
privilege escalation. (CVE-2009-1072, Moderate)
* a deficiency was found in the Linux kernel signals implementation. The
kill_something_info() function did not check if a process was outside the
caller's namespace before sending the kill signal, making it possible to
kill processes in all process ID (PID) namespaces, breaking PID namespace
isolation. (CVE-2009-1338, Moderate)
* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and
agp_generic_alloc_pages() functions did not zero out the memory pages they
allocate, which may later be available to user-space processes. This flaw
could possibly lead to an information leak. (CVE-2009-1192, Low)
These updated packages also fix the following bugs:
* the "-fwrapv" flag was added to the gcc build options to prevent gcc from
optimizing away wrapping arithmetic, as optimizing away wrapping may lead
to unexpected results. (BZ#491264)
* the bnx2x driver may have failed when highly-stressed by network
stress-tests, resulting in network access being unavailable. This driver
has been updated to resolve this issue. (BZ#495472)
* the file system mask, which lists capabilities for users with a file
system user ID (fsuid) of 0, was missing the CAP_MKNOD and
CAP_LINUX_IMMUTABLE capabilities. This could, potentially, allow users with
an fsuid other than 0 to perform actions on some file system types that
would otherwise be prevented. This update adds these capabilities.
(BZ#497047)
* "/proc/[pid]/maps" and "/proc/[pid]/smaps" can only be read by processes
able to use the ptrace() call on a given process; however, certain
information from "/proc/[pid]/stat" and "/proc/[pid]/wchan" could be used
to reconstruct memory maps, making it possible to bypass the Address Space
Layout Randomization (ASLR) security feature. This update addresses this
issue. (BZ#499550)
* the get_random_int() function returned the same number until the jiffies
counter (which ticks at a clock interrupt frequency) or process ID (PID)
changed, making it possible to predict the random numbers. This may have
helped to bypass the ASLR security feature. With this update,
get_random_int() is more random and no longer uses a common seed value.
This reduces the possibility of predicting the values get_random_int()
returns. (BZ#499787)
All Red Hat Enterprise MRG users should upgrade to these updated packages,
which contain backported patches to resolve these issues. Note: The system
must be rebooted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel-rt packages that fix several security issues and various\nbugs are now available for Red Hat Enterprise MRG 1.1.3.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a buffer overflow flaw was found in the CIFSTCon() function of the Linux\nkernel Common Internet File System (CIFS) implementation. When mounting a\nCIFS share, a malicious server could send an overly-long string to the\nclient, possibly leading to a denial of service or privilege escalation on\nthe client mounting the CIFS share. (CVE-2009-1439, Important)\n\n* the Linux kernel Network File System daemon (nfsd) implementation did not\ndrop the CAP_MKNOD capability when handling requests from local,\nunprivileged users. This flaw could possibly lead to an information leak or\nprivilege escalation. (CVE-2009-1072, Moderate)\n\n* a deficiency was found in the Linux kernel signals implementation. The\nkill_something_info() function did not check if a process was outside the\ncaller\u0027s namespace before sending the kill signal, making it possible to\nkill processes in all process ID (PID) namespaces, breaking PID namespace\nisolation. (CVE-2009-1338, Moderate)\n\n* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and\nagp_generic_alloc_pages() functions did not zero out the memory pages they\nallocate, which may later be available to user-space processes. This flaw\ncould possibly lead to an information leak. (CVE-2009-1192, Low)\n\nThese updated packages also fix the following bugs:\n\n* the \"-fwrapv\" flag was added to the gcc build options to prevent gcc from\noptimizing away wrapping arithmetic, as optimizing away wrapping may lead\nto unexpected results. (BZ#491264)\n\n* the bnx2x driver may have failed when highly-stressed by network\nstress-tests, resulting in network access being unavailable. This driver\nhas been updated to resolve this issue. (BZ#495472)\n\n* the file system mask, which lists capabilities for users with a file\nsystem user ID (fsuid) of 0, was missing the CAP_MKNOD and\nCAP_LINUX_IMMUTABLE capabilities. This could, potentially, allow users with\nan fsuid other than 0 to perform actions on some file system types that\nwould otherwise be prevented. This update adds these capabilities.\n(BZ#497047)\n\n* \"/proc/[pid]/maps\" and \"/proc/[pid]/smaps\" can only be read by processes\nable to use the ptrace() call on a given process; however, certain\ninformation from \"/proc/[pid]/stat\" and \"/proc/[pid]/wchan\" could be used\nto reconstruct memory maps, making it possible to bypass the Address Space\nLayout Randomization (ASLR) security feature. This update addresses this\nissue. (BZ#499550)\n\n* the get_random_int() function returned the same number until the jiffies\ncounter (which ticks at a clock interrupt frequency) or process ID (PID)\nchanged, making it possible to predict the random numbers. This may have\nhelped to bypass the ASLR security feature. With this update,\nget_random_int() is more random and no longer uses a common seed value.\nThis reduces the possibility of predicting the values get_random_int()\nreturns. (BZ#499787)\n\nAll Red Hat Enterprise MRG users should upgrade to these updated packages,\nwhich contain backported patches to resolve these issues. Note: The system\nmust be rebooted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1081", "url": "https://access.redhat.com/errata/RHSA-2009:1081" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "491264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491264" }, { "category": "external", "summary": "491572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572" }, { "category": "external", "summary": "494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "495472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495472" }, { "category": "external", "summary": "496031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496031" }, { "category": "external", "summary": "497020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020" }, { "category": "external", "summary": "497047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497047" }, { "category": "external", "summary": "499550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499550" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1081.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-22T02:59:24+00:00", "generator": { "date": "2024-11-22T02:59:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1081", "initial_release_date": "2009-06-03T15:36:00+00:00", "revision_history": [ { "date": "2009-06-03T15:36:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-06-03T11:36:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:59:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "MRG Realtime for RHEL 5 Server", "product": { "name": "MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-5" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-117.el5rt?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-117.el5rt?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "product": { "name": "kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "product_id": "kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-117.el5rt?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-117.el5rt.src", "product": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.src", "product_id": "kernel-rt-0:2.6.24.7-117.el5rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-117.el5rt?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.src as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src" }, "product_reference": "kernel-rt-0:2.6.24.7-117.el5rt.src", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch" }, "product_reference": "kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-1072", "discovery_date": "2009-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "491572" } ], "notes": [ { "category": "description", "text": "nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfsd should drop CAP_MKNOD for non-root", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 2.1 and 3, due to these products being in Production 3 of their maintenance life-cycles, where only qualified security errata of important or critical impact are addressed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1072" }, { "category": "external", "summary": "RHBZ#491572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1072", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072" } ], "release_date": "2009-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1081" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfsd should drop CAP_MKNOD for non-root" }, { "cve": "CVE-2009-1192", "discovery_date": "2009-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "497020" } ], "notes": [ { "category": "description", "text": "The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: agp: zero pages before sending to userspace", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1192" }, { "category": "external", "summary": "RHBZ#497020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1192", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192" } ], "release_date": "2009-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1081" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: agp: zero pages before sending to userspace" }, { "cve": "CVE-2009-1338", "discovery_date": "2009-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "496031" } ], "notes": [ { "category": "description", "text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 2.6.28 does not consider PID namespaces when processing signals directed to PID -1, which allows local users to bypass the intended namespace isolation, and send arbitrary signals to all processes in all namespaces, via a kill command.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: \u0027kill sig -1\u0027 must only apply to caller\u0027s pid namespace", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1338" }, { "category": "external", "summary": "RHBZ#496031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496031" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1338", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1338" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1338", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1338" } ], "release_date": "2008-10-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1081" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: \u0027kill sig -1\u0027 must only apply to caller\u0027s pid namespace" }, { "cve": "CVE-2009-1439", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "494275" } ], "notes": [ { "category": "description", "text": "Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1439" }, { "category": "external", "summary": "RHBZ#494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1439", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439" } ], "release_date": "2009-03-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1081" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount" }, { "cve": "CVE-2009-3238", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "discovery_date": "2009-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "524512" } ], "notes": [ { "category": "description", "text": "The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function\u0027s tendency to \"return the same value over and over again for long stretches of time.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: random: add robust get_random_u32, remove weak get_random_int", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3238" }, { "category": "external", "summary": "RHBZ#524512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524512" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3238", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3238" } ], "release_date": "2009-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1081" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: random: add robust get_random_u32, remove weak get_random_int" } ] }
rhsa-2009_1106
Vulnerability from csaf_redhat
Published
2009-06-16 21:21
Modified
2024-11-22 02:59
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix several security issues and several bugs
are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security fixes:
* several flaws were found in the way the Linux kernel CIFS implementation
handles Unicode strings. CIFS clients convert Unicode strings sent by a
server to their local character sets, and then write those strings into
memory. If a malicious server sent a long enough string, it could write
past the end of the target memory region and corrupt other memory areas,
possibly leading to a denial of service or privilege escalation on the
client mounting the CIFS share. (CVE-2009-1439, CVE-2009-1633, Important)
* the Linux kernel Network File System daemon (nfsd) implementation did not
drop the CAP_MKNOD capability when handling requests from local,
unprivileged users. This flaw could possibly lead to an information leak or
privilege escalation. (CVE-2009-1072, Moderate)
* Frank Filz reported the NFSv4 client was missing a file permission check
for the execute bit in some situations. This could allow local,
unprivileged users to run non-executable files on NFSv4 mounted file
systems. (CVE-2009-1630, Moderate)
* a missing check was found in the hypervisor_callback() function in the
Linux kernel provided by the kernel-xen package. This could cause a denial
of service of a 32-bit guest if an application running in that guest
accesses a certain memory location in the kernel. (CVE-2009-1758, Moderate)
* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and
agp_generic_alloc_pages() functions did not zero out the memory pages they
allocate, which may later be available to user-space processes. This flaw
could possibly lead to an information leak. (CVE-2009-1192, Low)
Bug fixes:
* a race in the NFS client between destroying cached access rights and
unmounting an NFS file system could have caused a system crash. "Busy
inodes" messages may have been logged. (BZ#498653)
* nanosleep() could sleep several milliseconds less than the specified time
on Intel Itanium®-based systems. (BZ#500349)
* LEDs for disk drives in AHCI mode may have displayed a fault state when
there were no faults. (BZ#500120)
* ptrace_do_wait() reported tasks were stopped each time the process doing
the trace called wait(), instead of reporting it once. (BZ#486945)
* epoll_wait() may have caused a system lockup and problems for
applications. (BZ#497322)
* missing capabilities could possibly allow users with an fsuid other than
0 to perform actions on some file system types that would otherwise be
prevented. (BZ#497271)
* on NFS mounted file systems, heavy write loads may have blocked
nfs_getattr() for long periods, causing commands that use stat(2), such as
ls, to hang. (BZ#486926)
* in rare circumstances, if an application performed multiple O_DIRECT
reads per virtual memory page and also performed fork(2), the buffer
storing the result of the I/O may have ended up with invalid data.
(BZ#486921)
* when using GFS2, gfs2_quotad may have entered an uninterpretable sleep
state. (BZ#501742)
* with this update, get_random_int() is more random and no longer uses a
common seed value, reducing the possibility of predicting the values
returned. (BZ#499783)
* the "-fwrapv" flag was added to the gcc build options to prevent gcc from
optimizing away wrapping. (BZ#501751)
* a kernel panic when enabling and disabling iSCSI paths. (BZ#502916)
* using the Broadcom NetXtreme BCM5704 network device with the tg3 driver
caused high system load and very bad performance. (BZ#502837)
* "/proc/[pid]/maps" and "/proc/[pid]/smaps" can only be read by processes
able to use the ptrace() call on a given process; however, certain
information from "/proc/[pid]/stat" and "/proc/[pid]/wchan" could be used
to reconstruct memory maps. (BZ#499546)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* several flaws were found in the way the Linux kernel CIFS implementation\nhandles Unicode strings. CIFS clients convert Unicode strings sent by a\nserver to their local character sets, and then write those strings into\nmemory. If a malicious server sent a long enough string, it could write\npast the end of the target memory region and corrupt other memory areas,\npossibly leading to a denial of service or privilege escalation on the\nclient mounting the CIFS share. (CVE-2009-1439, CVE-2009-1633, Important)\n\n* the Linux kernel Network File System daemon (nfsd) implementation did not\ndrop the CAP_MKNOD capability when handling requests from local,\nunprivileged users. This flaw could possibly lead to an information leak or\nprivilege escalation. (CVE-2009-1072, Moderate)\n\n* Frank Filz reported the NFSv4 client was missing a file permission check\nfor the execute bit in some situations. This could allow local,\nunprivileged users to run non-executable files on NFSv4 mounted file\nsystems. (CVE-2009-1630, Moderate)\n\n* a missing check was found in the hypervisor_callback() function in the\nLinux kernel provided by the kernel-xen package. This could cause a denial\nof service of a 32-bit guest if an application running in that guest\naccesses a certain memory location in the kernel. (CVE-2009-1758, Moderate)\n\n* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and\nagp_generic_alloc_pages() functions did not zero out the memory pages they\nallocate, which may later be available to user-space processes. This flaw\ncould possibly lead to an information leak. (CVE-2009-1192, Low)\n\nBug fixes:\n\n* a race in the NFS client between destroying cached access rights and\nunmounting an NFS file system could have caused a system crash. \"Busy\ninodes\" messages may have been logged. (BZ#498653)\n\n* nanosleep() could sleep several milliseconds less than the specified time\non Intel Itanium\u00ae-based systems. (BZ#500349)\n\n* LEDs for disk drives in AHCI mode may have displayed a fault state when\nthere were no faults. (BZ#500120)\n\n* ptrace_do_wait() reported tasks were stopped each time the process doing\nthe trace called wait(), instead of reporting it once. (BZ#486945)\n\n* epoll_wait() may have caused a system lockup and problems for\napplications. (BZ#497322)\n\n* missing capabilities could possibly allow users with an fsuid other than\n0 to perform actions on some file system types that would otherwise be\nprevented. (BZ#497271)\n\n* on NFS mounted file systems, heavy write loads may have blocked\nnfs_getattr() for long periods, causing commands that use stat(2), such as\nls, to hang. (BZ#486926)\n\n* in rare circumstances, if an application performed multiple O_DIRECT\nreads per virtual memory page and also performed fork(2), the buffer\nstoring the result of the I/O may have ended up with invalid data.\n(BZ#486921)\n\n* when using GFS2, gfs2_quotad may have entered an uninterpretable sleep\nstate. (BZ#501742)\n\n* with this update, get_random_int() is more random and no longer uses a\ncommon seed value, reducing the possibility of predicting the values\nreturned. (BZ#499783)\n\n* the \"-fwrapv\" flag was added to the gcc build options to prevent gcc from\noptimizing away wrapping. (BZ#501751)\n\n* a kernel panic when enabling and disabling iSCSI paths. (BZ#502916)\n\n* using the Broadcom NetXtreme BCM5704 network device with the tg3 driver\ncaused high system load and very bad performance. (BZ#502837)\n\n* \"/proc/[pid]/maps\" and \"/proc/[pid]/smaps\" can only be read by processes\nable to use the ptrace() call on a given process; however, certain\ninformation from \"/proc/[pid]/stat\" and \"/proc/[pid]/wchan\" could be used\nto reconstruct memory maps. (BZ#499546)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1106", "url": "https://access.redhat.com/errata/RHSA-2009:1106" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "486921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486921" }, { "category": "external", "summary": "486926", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486926" }, { "category": "external", "summary": "486945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486945" }, { "category": "external", "summary": "491572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572" }, { "category": "external", "summary": "494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "496572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572" }, { "category": "external", "summary": "497020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020" }, { "category": "external", "summary": "497322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497322" }, { "category": "external", "summary": "498653", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=498653" }, { "category": "external", "summary": "499546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499546" }, { "category": "external", "summary": "500120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500120" }, { "category": "external", "summary": "500297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297" }, { "category": "external", "summary": "500349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500349" }, { "category": "external", "summary": "500945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500945" }, { "category": "external", "summary": "501742", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501742" }, { "category": "external", "summary": "501751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501751" }, { "category": "external", "summary": "502837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502837" }, { "category": "external", "summary": "502916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502916" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1106.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T02:59:29+00:00", "generator": { "date": "2024-11-22T02:59:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1106", "initial_release_date": "2009-06-16T21:21:00+00:00", "revision_history": [ { "date": "2009-06-16T21:21:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-06-16T18:34:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:59:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.14.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.14.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.src", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.src", "product_id": "kernel-0:2.6.18-128.1.14.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "product_id": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-128.1.14.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.14.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.1.14.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.1.14.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.src" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-128.1.14.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.src" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-128.1.14.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-1072", "discovery_date": "2009-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "491572" } ], "notes": [ { "category": "description", "text": "nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfsd should drop CAP_MKNOD for non-root", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 2.1 and 3, due to these products being in Production 3 of their maintenance life-cycles, where only qualified security errata of important or critical impact are addressed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1072" }, { "category": "external", "summary": "RHBZ#491572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1072", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072" } ], "release_date": "2009-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfsd should drop CAP_MKNOD for non-root" }, { "cve": "CVE-2009-1192", "discovery_date": "2009-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "497020" } ], "notes": [ { "category": "description", "text": "The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: agp: zero pages before sending to userspace", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1192" }, { "category": "external", "summary": "RHBZ#497020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1192", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192" } ], "release_date": "2009-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: agp: zero pages before sending to userspace" }, { "cve": "CVE-2009-1439", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "494275" } ], "notes": [ { "category": "description", "text": "Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1439" }, { "category": "external", "summary": "RHBZ#494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1439", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439" } ], "release_date": "2009-03-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount" }, { "cve": "CVE-2009-1630", "discovery_date": "2009-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "500297" } ], "notes": [ { "category": "description", "text": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1630" }, { "category": "external", "summary": "RHBZ#500297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1630", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630" } ], "release_date": "2009-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission" }, { "cve": "CVE-2009-1633", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-04-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "496572" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1633" }, { "category": "external", "summary": "RHBZ#496572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1633", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633" } ], "release_date": "2009-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server" }, { "cve": "CVE-2009-1758", "discovery_date": "2009-05-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "500945" } ], "notes": [ { "category": "description", "text": "The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in \"certain address ranges.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xen: local denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and Red Hat Enterprise MRG.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1758" }, { "category": "external", "summary": "RHBZ#500945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1758", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1758" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1758", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1758" } ], "release_date": "2009-05-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: xen: local denial of service" }, { "cve": "CVE-2009-3238", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "discovery_date": "2009-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "524512" } ], "notes": [ { "category": "description", "text": "The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function\u0027s tendency to \"return the same value over and over again for long stretches of time.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: random: add robust get_random_u32, remove weak get_random_int", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3238" }, { "category": "external", "summary": "RHBZ#524512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524512" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3238", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3238" } ], "release_date": "2009-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: random: add robust get_random_u32, remove weak get_random_int" } ] }
rhsa-2009:1081
Vulnerability from csaf_redhat
Published
2009-06-03 15:36
Modified
2024-11-22 02:59
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
Updated kernel-rt packages that fix several security issues and various
bugs are now available for Red Hat Enterprise MRG 1.1.3.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel-rt packages contain the Linux kernel, the core of any Linux
operating system.
These updated packages fix the following security issues:
* a buffer overflow flaw was found in the CIFSTCon() function of the Linux
kernel Common Internet File System (CIFS) implementation. When mounting a
CIFS share, a malicious server could send an overly-long string to the
client, possibly leading to a denial of service or privilege escalation on
the client mounting the CIFS share. (CVE-2009-1439, Important)
* the Linux kernel Network File System daemon (nfsd) implementation did not
drop the CAP_MKNOD capability when handling requests from local,
unprivileged users. This flaw could possibly lead to an information leak or
privilege escalation. (CVE-2009-1072, Moderate)
* a deficiency was found in the Linux kernel signals implementation. The
kill_something_info() function did not check if a process was outside the
caller's namespace before sending the kill signal, making it possible to
kill processes in all process ID (PID) namespaces, breaking PID namespace
isolation. (CVE-2009-1338, Moderate)
* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and
agp_generic_alloc_pages() functions did not zero out the memory pages they
allocate, which may later be available to user-space processes. This flaw
could possibly lead to an information leak. (CVE-2009-1192, Low)
These updated packages also fix the following bugs:
* the "-fwrapv" flag was added to the gcc build options to prevent gcc from
optimizing away wrapping arithmetic, as optimizing away wrapping may lead
to unexpected results. (BZ#491264)
* the bnx2x driver may have failed when highly-stressed by network
stress-tests, resulting in network access being unavailable. This driver
has been updated to resolve this issue. (BZ#495472)
* the file system mask, which lists capabilities for users with a file
system user ID (fsuid) of 0, was missing the CAP_MKNOD and
CAP_LINUX_IMMUTABLE capabilities. This could, potentially, allow users with
an fsuid other than 0 to perform actions on some file system types that
would otherwise be prevented. This update adds these capabilities.
(BZ#497047)
* "/proc/[pid]/maps" and "/proc/[pid]/smaps" can only be read by processes
able to use the ptrace() call on a given process; however, certain
information from "/proc/[pid]/stat" and "/proc/[pid]/wchan" could be used
to reconstruct memory maps, making it possible to bypass the Address Space
Layout Randomization (ASLR) security feature. This update addresses this
issue. (BZ#499550)
* the get_random_int() function returned the same number until the jiffies
counter (which ticks at a clock interrupt frequency) or process ID (PID)
changed, making it possible to predict the random numbers. This may have
helped to bypass the ASLR security feature. With this update,
get_random_int() is more random and no longer uses a common seed value.
This reduces the possibility of predicting the values get_random_int()
returns. (BZ#499787)
All Red Hat Enterprise MRG users should upgrade to these updated packages,
which contain backported patches to resolve these issues. Note: The system
must be rebooted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel-rt packages that fix several security issues and various\nbugs are now available for Red Hat Enterprise MRG 1.1.3.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a buffer overflow flaw was found in the CIFSTCon() function of the Linux\nkernel Common Internet File System (CIFS) implementation. When mounting a\nCIFS share, a malicious server could send an overly-long string to the\nclient, possibly leading to a denial of service or privilege escalation on\nthe client mounting the CIFS share. (CVE-2009-1439, Important)\n\n* the Linux kernel Network File System daemon (nfsd) implementation did not\ndrop the CAP_MKNOD capability when handling requests from local,\nunprivileged users. This flaw could possibly lead to an information leak or\nprivilege escalation. (CVE-2009-1072, Moderate)\n\n* a deficiency was found in the Linux kernel signals implementation. The\nkill_something_info() function did not check if a process was outside the\ncaller\u0027s namespace before sending the kill signal, making it possible to\nkill processes in all process ID (PID) namespaces, breaking PID namespace\nisolation. (CVE-2009-1338, Moderate)\n\n* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and\nagp_generic_alloc_pages() functions did not zero out the memory pages they\nallocate, which may later be available to user-space processes. This flaw\ncould possibly lead to an information leak. (CVE-2009-1192, Low)\n\nThese updated packages also fix the following bugs:\n\n* the \"-fwrapv\" flag was added to the gcc build options to prevent gcc from\noptimizing away wrapping arithmetic, as optimizing away wrapping may lead\nto unexpected results. (BZ#491264)\n\n* the bnx2x driver may have failed when highly-stressed by network\nstress-tests, resulting in network access being unavailable. This driver\nhas been updated to resolve this issue. (BZ#495472)\n\n* the file system mask, which lists capabilities for users with a file\nsystem user ID (fsuid) of 0, was missing the CAP_MKNOD and\nCAP_LINUX_IMMUTABLE capabilities. This could, potentially, allow users with\nan fsuid other than 0 to perform actions on some file system types that\nwould otherwise be prevented. This update adds these capabilities.\n(BZ#497047)\n\n* \"/proc/[pid]/maps\" and \"/proc/[pid]/smaps\" can only be read by processes\nable to use the ptrace() call on a given process; however, certain\ninformation from \"/proc/[pid]/stat\" and \"/proc/[pid]/wchan\" could be used\nto reconstruct memory maps, making it possible to bypass the Address Space\nLayout Randomization (ASLR) security feature. This update addresses this\nissue. (BZ#499550)\n\n* the get_random_int() function returned the same number until the jiffies\ncounter (which ticks at a clock interrupt frequency) or process ID (PID)\nchanged, making it possible to predict the random numbers. This may have\nhelped to bypass the ASLR security feature. With this update,\nget_random_int() is more random and no longer uses a common seed value.\nThis reduces the possibility of predicting the values get_random_int()\nreturns. (BZ#499787)\n\nAll Red Hat Enterprise MRG users should upgrade to these updated packages,\nwhich contain backported patches to resolve these issues. Note: The system\nmust be rebooted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1081", "url": "https://access.redhat.com/errata/RHSA-2009:1081" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "491264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491264" }, { "category": "external", "summary": "491572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572" }, { "category": "external", "summary": "494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "495472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495472" }, { "category": "external", "summary": "496031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496031" }, { "category": "external", "summary": "497020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020" }, { "category": "external", "summary": "497047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497047" }, { "category": "external", "summary": "499550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499550" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1081.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-22T02:59:24+00:00", "generator": { "date": "2024-11-22T02:59:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1081", "initial_release_date": "2009-06-03T15:36:00+00:00", "revision_history": [ { "date": "2009-06-03T15:36:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-06-03T11:36:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:59:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "MRG Realtime for RHEL 5 Server", "product": { "name": "MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-5" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-117.el5rt?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-117.el5rt?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "product": { "name": "kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "product_id": "kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-117.el5rt?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-117.el5rt.src", "product": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.src", "product_id": "kernel-rt-0:2.6.24.7-117.el5rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-117.el5rt?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.src as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src" }, "product_reference": "kernel-rt-0:2.6.24.7-117.el5rt.src", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch" }, "product_reference": "kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-1072", "discovery_date": "2009-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "491572" } ], "notes": [ { "category": "description", "text": "nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfsd should drop CAP_MKNOD for non-root", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 2.1 and 3, due to these products being in Production 3 of their maintenance life-cycles, where only qualified security errata of important or critical impact are addressed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1072" }, { "category": "external", "summary": "RHBZ#491572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1072", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072" } ], "release_date": "2009-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1081" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfsd should drop CAP_MKNOD for non-root" }, { "cve": "CVE-2009-1192", "discovery_date": "2009-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "497020" } ], "notes": [ { "category": "description", "text": "The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: agp: zero pages before sending to userspace", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1192" }, { "category": "external", "summary": "RHBZ#497020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1192", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192" } ], "release_date": "2009-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1081" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: agp: zero pages before sending to userspace" }, { "cve": "CVE-2009-1338", "discovery_date": "2009-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "496031" } ], "notes": [ { "category": "description", "text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 2.6.28 does not consider PID namespaces when processing signals directed to PID -1, which allows local users to bypass the intended namespace isolation, and send arbitrary signals to all processes in all namespaces, via a kill command.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: \u0027kill sig -1\u0027 must only apply to caller\u0027s pid namespace", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1338" }, { "category": "external", "summary": "RHBZ#496031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496031" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1338", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1338" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1338", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1338" } ], "release_date": "2008-10-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1081" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: \u0027kill sig -1\u0027 must only apply to caller\u0027s pid namespace" }, { "cve": "CVE-2009-1439", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "494275" } ], "notes": [ { "category": "description", "text": "Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1439" }, { "category": "external", "summary": "RHBZ#494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1439", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439" } ], "release_date": "2009-03-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1081" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount" }, { "cve": "CVE-2009-3238", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "discovery_date": "2009-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "524512" } ], "notes": [ { "category": "description", "text": "The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function\u0027s tendency to \"return the same value over and over again for long stretches of time.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: random: add robust get_random_u32, remove weak get_random_int", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3238" }, { "category": "external", "summary": "RHBZ#524512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524512" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3238", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3238" } ], "release_date": "2009-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1081" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: random: add robust get_random_u32, remove weak get_random_int" } ] }
RHSA-2009:1106
Vulnerability from csaf_redhat
Published
2009-06-16 21:21
Modified
2024-11-22 02:59
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix several security issues and several bugs
are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security fixes:
* several flaws were found in the way the Linux kernel CIFS implementation
handles Unicode strings. CIFS clients convert Unicode strings sent by a
server to their local character sets, and then write those strings into
memory. If a malicious server sent a long enough string, it could write
past the end of the target memory region and corrupt other memory areas,
possibly leading to a denial of service or privilege escalation on the
client mounting the CIFS share. (CVE-2009-1439, CVE-2009-1633, Important)
* the Linux kernel Network File System daemon (nfsd) implementation did not
drop the CAP_MKNOD capability when handling requests from local,
unprivileged users. This flaw could possibly lead to an information leak or
privilege escalation. (CVE-2009-1072, Moderate)
* Frank Filz reported the NFSv4 client was missing a file permission check
for the execute bit in some situations. This could allow local,
unprivileged users to run non-executable files on NFSv4 mounted file
systems. (CVE-2009-1630, Moderate)
* a missing check was found in the hypervisor_callback() function in the
Linux kernel provided by the kernel-xen package. This could cause a denial
of service of a 32-bit guest if an application running in that guest
accesses a certain memory location in the kernel. (CVE-2009-1758, Moderate)
* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and
agp_generic_alloc_pages() functions did not zero out the memory pages they
allocate, which may later be available to user-space processes. This flaw
could possibly lead to an information leak. (CVE-2009-1192, Low)
Bug fixes:
* a race in the NFS client between destroying cached access rights and
unmounting an NFS file system could have caused a system crash. "Busy
inodes" messages may have been logged. (BZ#498653)
* nanosleep() could sleep several milliseconds less than the specified time
on Intel Itanium®-based systems. (BZ#500349)
* LEDs for disk drives in AHCI mode may have displayed a fault state when
there were no faults. (BZ#500120)
* ptrace_do_wait() reported tasks were stopped each time the process doing
the trace called wait(), instead of reporting it once. (BZ#486945)
* epoll_wait() may have caused a system lockup and problems for
applications. (BZ#497322)
* missing capabilities could possibly allow users with an fsuid other than
0 to perform actions on some file system types that would otherwise be
prevented. (BZ#497271)
* on NFS mounted file systems, heavy write loads may have blocked
nfs_getattr() for long periods, causing commands that use stat(2), such as
ls, to hang. (BZ#486926)
* in rare circumstances, if an application performed multiple O_DIRECT
reads per virtual memory page and also performed fork(2), the buffer
storing the result of the I/O may have ended up with invalid data.
(BZ#486921)
* when using GFS2, gfs2_quotad may have entered an uninterpretable sleep
state. (BZ#501742)
* with this update, get_random_int() is more random and no longer uses a
common seed value, reducing the possibility of predicting the values
returned. (BZ#499783)
* the "-fwrapv" flag was added to the gcc build options to prevent gcc from
optimizing away wrapping. (BZ#501751)
* a kernel panic when enabling and disabling iSCSI paths. (BZ#502916)
* using the Broadcom NetXtreme BCM5704 network device with the tg3 driver
caused high system load and very bad performance. (BZ#502837)
* "/proc/[pid]/maps" and "/proc/[pid]/smaps" can only be read by processes
able to use the ptrace() call on a given process; however, certain
information from "/proc/[pid]/stat" and "/proc/[pid]/wchan" could be used
to reconstruct memory maps. (BZ#499546)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* several flaws were found in the way the Linux kernel CIFS implementation\nhandles Unicode strings. CIFS clients convert Unicode strings sent by a\nserver to their local character sets, and then write those strings into\nmemory. If a malicious server sent a long enough string, it could write\npast the end of the target memory region and corrupt other memory areas,\npossibly leading to a denial of service or privilege escalation on the\nclient mounting the CIFS share. (CVE-2009-1439, CVE-2009-1633, Important)\n\n* the Linux kernel Network File System daemon (nfsd) implementation did not\ndrop the CAP_MKNOD capability when handling requests from local,\nunprivileged users. This flaw could possibly lead to an information leak or\nprivilege escalation. (CVE-2009-1072, Moderate)\n\n* Frank Filz reported the NFSv4 client was missing a file permission check\nfor the execute bit in some situations. This could allow local,\nunprivileged users to run non-executable files on NFSv4 mounted file\nsystems. (CVE-2009-1630, Moderate)\n\n* a missing check was found in the hypervisor_callback() function in the\nLinux kernel provided by the kernel-xen package. This could cause a denial\nof service of a 32-bit guest if an application running in that guest\naccesses a certain memory location in the kernel. (CVE-2009-1758, Moderate)\n\n* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and\nagp_generic_alloc_pages() functions did not zero out the memory pages they\nallocate, which may later be available to user-space processes. This flaw\ncould possibly lead to an information leak. (CVE-2009-1192, Low)\n\nBug fixes:\n\n* a race in the NFS client between destroying cached access rights and\nunmounting an NFS file system could have caused a system crash. \"Busy\ninodes\" messages may have been logged. (BZ#498653)\n\n* nanosleep() could sleep several milliseconds less than the specified time\non Intel Itanium\u00ae-based systems. (BZ#500349)\n\n* LEDs for disk drives in AHCI mode may have displayed a fault state when\nthere were no faults. (BZ#500120)\n\n* ptrace_do_wait() reported tasks were stopped each time the process doing\nthe trace called wait(), instead of reporting it once. (BZ#486945)\n\n* epoll_wait() may have caused a system lockup and problems for\napplications. (BZ#497322)\n\n* missing capabilities could possibly allow users with an fsuid other than\n0 to perform actions on some file system types that would otherwise be\nprevented. (BZ#497271)\n\n* on NFS mounted file systems, heavy write loads may have blocked\nnfs_getattr() for long periods, causing commands that use stat(2), such as\nls, to hang. (BZ#486926)\n\n* in rare circumstances, if an application performed multiple O_DIRECT\nreads per virtual memory page and also performed fork(2), the buffer\nstoring the result of the I/O may have ended up with invalid data.\n(BZ#486921)\n\n* when using GFS2, gfs2_quotad may have entered an uninterpretable sleep\nstate. (BZ#501742)\n\n* with this update, get_random_int() is more random and no longer uses a\ncommon seed value, reducing the possibility of predicting the values\nreturned. (BZ#499783)\n\n* the \"-fwrapv\" flag was added to the gcc build options to prevent gcc from\noptimizing away wrapping. (BZ#501751)\n\n* a kernel panic when enabling and disabling iSCSI paths. (BZ#502916)\n\n* using the Broadcom NetXtreme BCM5704 network device with the tg3 driver\ncaused high system load and very bad performance. (BZ#502837)\n\n* \"/proc/[pid]/maps\" and \"/proc/[pid]/smaps\" can only be read by processes\nable to use the ptrace() call on a given process; however, certain\ninformation from \"/proc/[pid]/stat\" and \"/proc/[pid]/wchan\" could be used\nto reconstruct memory maps. (BZ#499546)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1106", "url": "https://access.redhat.com/errata/RHSA-2009:1106" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "486921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486921" }, { "category": "external", "summary": "486926", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486926" }, { "category": "external", "summary": "486945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486945" }, { "category": "external", "summary": "491572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572" }, { "category": "external", "summary": "494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "496572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572" }, { "category": "external", "summary": "497020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020" }, { "category": "external", "summary": "497322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497322" }, { "category": "external", "summary": "498653", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=498653" }, { "category": "external", "summary": "499546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499546" }, { "category": "external", "summary": "500120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500120" }, { "category": "external", "summary": "500297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297" }, { "category": "external", "summary": "500349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500349" }, { "category": "external", "summary": "500945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500945" }, { "category": "external", "summary": "501742", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501742" }, { "category": "external", "summary": "501751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501751" }, { "category": "external", "summary": "502837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502837" }, { "category": "external", "summary": "502916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502916" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1106.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T02:59:29+00:00", "generator": { "date": "2024-11-22T02:59:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1106", "initial_release_date": "2009-06-16T21:21:00+00:00", "revision_history": [ { "date": "2009-06-16T21:21:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-06-16T18:34:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:59:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.14.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.14.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.src", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.src", "product_id": "kernel-0:2.6.18-128.1.14.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "product_id": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-128.1.14.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.14.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.1.14.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.1.14.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.src" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-128.1.14.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.src" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-128.1.14.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-1072", "discovery_date": "2009-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "491572" } ], "notes": [ { "category": "description", "text": "nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfsd should drop CAP_MKNOD for non-root", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 2.1 and 3, due to these products being in Production 3 of their maintenance life-cycles, where only qualified security errata of important or critical impact are addressed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1072" }, { "category": "external", "summary": "RHBZ#491572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1072", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072" } ], "release_date": "2009-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfsd should drop CAP_MKNOD for non-root" }, { "cve": "CVE-2009-1192", "discovery_date": "2009-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "497020" } ], "notes": [ { "category": "description", "text": "The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: agp: zero pages before sending to userspace", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1192" }, { "category": "external", "summary": "RHBZ#497020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1192", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192" } ], "release_date": "2009-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: agp: zero pages before sending to userspace" }, { "cve": "CVE-2009-1439", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "494275" } ], "notes": [ { "category": "description", "text": "Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1439" }, { "category": "external", "summary": "RHBZ#494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1439", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439" } ], "release_date": "2009-03-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount" }, { "cve": "CVE-2009-1630", "discovery_date": "2009-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "500297" } ], "notes": [ { "category": "description", "text": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1630" }, { "category": "external", "summary": "RHBZ#500297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1630", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630" } ], "release_date": "2009-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission" }, { "cve": "CVE-2009-1633", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-04-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "496572" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1633" }, { "category": "external", "summary": "RHBZ#496572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1633", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633" } ], "release_date": "2009-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server" }, { "cve": "CVE-2009-1758", "discovery_date": "2009-05-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "500945" } ], "notes": [ { "category": "description", "text": "The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in \"certain address ranges.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xen: local denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and Red Hat Enterprise MRG.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1758" }, { "category": "external", "summary": "RHBZ#500945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1758", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1758" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1758", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1758" } ], "release_date": "2009-05-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: xen: local denial of service" }, { "cve": "CVE-2009-3238", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "discovery_date": "2009-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "524512" } ], "notes": [ { "category": "description", "text": "The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function\u0027s tendency to \"return the same value over and over again for long stretches of time.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: random: add robust get_random_u32, remove weak get_random_int", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3238" }, { "category": "external", "summary": "RHBZ#524512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524512" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3238", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3238" } ], "release_date": "2009-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: random: add robust get_random_u32, remove weak get_random_int" } ] }
RHSA-2009:1081
Vulnerability from csaf_redhat
Published
2009-06-03 15:36
Modified
2024-11-22 02:59
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
Updated kernel-rt packages that fix several security issues and various
bugs are now available for Red Hat Enterprise MRG 1.1.3.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel-rt packages contain the Linux kernel, the core of any Linux
operating system.
These updated packages fix the following security issues:
* a buffer overflow flaw was found in the CIFSTCon() function of the Linux
kernel Common Internet File System (CIFS) implementation. When mounting a
CIFS share, a malicious server could send an overly-long string to the
client, possibly leading to a denial of service or privilege escalation on
the client mounting the CIFS share. (CVE-2009-1439, Important)
* the Linux kernel Network File System daemon (nfsd) implementation did not
drop the CAP_MKNOD capability when handling requests from local,
unprivileged users. This flaw could possibly lead to an information leak or
privilege escalation. (CVE-2009-1072, Moderate)
* a deficiency was found in the Linux kernel signals implementation. The
kill_something_info() function did not check if a process was outside the
caller's namespace before sending the kill signal, making it possible to
kill processes in all process ID (PID) namespaces, breaking PID namespace
isolation. (CVE-2009-1338, Moderate)
* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and
agp_generic_alloc_pages() functions did not zero out the memory pages they
allocate, which may later be available to user-space processes. This flaw
could possibly lead to an information leak. (CVE-2009-1192, Low)
These updated packages also fix the following bugs:
* the "-fwrapv" flag was added to the gcc build options to prevent gcc from
optimizing away wrapping arithmetic, as optimizing away wrapping may lead
to unexpected results. (BZ#491264)
* the bnx2x driver may have failed when highly-stressed by network
stress-tests, resulting in network access being unavailable. This driver
has been updated to resolve this issue. (BZ#495472)
* the file system mask, which lists capabilities for users with a file
system user ID (fsuid) of 0, was missing the CAP_MKNOD and
CAP_LINUX_IMMUTABLE capabilities. This could, potentially, allow users with
an fsuid other than 0 to perform actions on some file system types that
would otherwise be prevented. This update adds these capabilities.
(BZ#497047)
* "/proc/[pid]/maps" and "/proc/[pid]/smaps" can only be read by processes
able to use the ptrace() call on a given process; however, certain
information from "/proc/[pid]/stat" and "/proc/[pid]/wchan" could be used
to reconstruct memory maps, making it possible to bypass the Address Space
Layout Randomization (ASLR) security feature. This update addresses this
issue. (BZ#499550)
* the get_random_int() function returned the same number until the jiffies
counter (which ticks at a clock interrupt frequency) or process ID (PID)
changed, making it possible to predict the random numbers. This may have
helped to bypass the ASLR security feature. With this update,
get_random_int() is more random and no longer uses a common seed value.
This reduces the possibility of predicting the values get_random_int()
returns. (BZ#499787)
All Red Hat Enterprise MRG users should upgrade to these updated packages,
which contain backported patches to resolve these issues. Note: The system
must be rebooted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel-rt packages that fix several security issues and various\nbugs are now available for Red Hat Enterprise MRG 1.1.3.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a buffer overflow flaw was found in the CIFSTCon() function of the Linux\nkernel Common Internet File System (CIFS) implementation. When mounting a\nCIFS share, a malicious server could send an overly-long string to the\nclient, possibly leading to a denial of service or privilege escalation on\nthe client mounting the CIFS share. (CVE-2009-1439, Important)\n\n* the Linux kernel Network File System daemon (nfsd) implementation did not\ndrop the CAP_MKNOD capability when handling requests from local,\nunprivileged users. This flaw could possibly lead to an information leak or\nprivilege escalation. (CVE-2009-1072, Moderate)\n\n* a deficiency was found in the Linux kernel signals implementation. The\nkill_something_info() function did not check if a process was outside the\ncaller\u0027s namespace before sending the kill signal, making it possible to\nkill processes in all process ID (PID) namespaces, breaking PID namespace\nisolation. (CVE-2009-1338, Moderate)\n\n* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and\nagp_generic_alloc_pages() functions did not zero out the memory pages they\nallocate, which may later be available to user-space processes. This flaw\ncould possibly lead to an information leak. (CVE-2009-1192, Low)\n\nThese updated packages also fix the following bugs:\n\n* the \"-fwrapv\" flag was added to the gcc build options to prevent gcc from\noptimizing away wrapping arithmetic, as optimizing away wrapping may lead\nto unexpected results. (BZ#491264)\n\n* the bnx2x driver may have failed when highly-stressed by network\nstress-tests, resulting in network access being unavailable. This driver\nhas been updated to resolve this issue. (BZ#495472)\n\n* the file system mask, which lists capabilities for users with a file\nsystem user ID (fsuid) of 0, was missing the CAP_MKNOD and\nCAP_LINUX_IMMUTABLE capabilities. This could, potentially, allow users with\nan fsuid other than 0 to perform actions on some file system types that\nwould otherwise be prevented. This update adds these capabilities.\n(BZ#497047)\n\n* \"/proc/[pid]/maps\" and \"/proc/[pid]/smaps\" can only be read by processes\nable to use the ptrace() call on a given process; however, certain\ninformation from \"/proc/[pid]/stat\" and \"/proc/[pid]/wchan\" could be used\nto reconstruct memory maps, making it possible to bypass the Address Space\nLayout Randomization (ASLR) security feature. This update addresses this\nissue. (BZ#499550)\n\n* the get_random_int() function returned the same number until the jiffies\ncounter (which ticks at a clock interrupt frequency) or process ID (PID)\nchanged, making it possible to predict the random numbers. This may have\nhelped to bypass the ASLR security feature. With this update,\nget_random_int() is more random and no longer uses a common seed value.\nThis reduces the possibility of predicting the values get_random_int()\nreturns. (BZ#499787)\n\nAll Red Hat Enterprise MRG users should upgrade to these updated packages,\nwhich contain backported patches to resolve these issues. Note: The system\nmust be rebooted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1081", "url": "https://access.redhat.com/errata/RHSA-2009:1081" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "491264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491264" }, { "category": "external", "summary": "491572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572" }, { "category": "external", "summary": "494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "495472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495472" }, { "category": "external", "summary": "496031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496031" }, { "category": "external", "summary": "497020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020" }, { "category": "external", "summary": "497047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497047" }, { "category": "external", "summary": "499550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499550" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1081.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-22T02:59:24+00:00", "generator": { "date": "2024-11-22T02:59:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1081", "initial_release_date": "2009-06-03T15:36:00+00:00", "revision_history": [ { "date": "2009-06-03T15:36:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-06-03T11:36:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:59:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "MRG Realtime for RHEL 5 Server", "product": { "name": "MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-5" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-117.el5rt?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-117.el5rt?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "product": { "name": "kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "product_id": "kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-117.el5rt?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-117.el5rt.src", "product": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.src", "product_id": "kernel-rt-0:2.6.24.7-117.el5rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-117.el5rt?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.src as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src" }, "product_reference": "kernel-rt-0:2.6.24.7-117.el5rt.src", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch" }, "product_reference": "kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-1072", "discovery_date": "2009-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "491572" } ], "notes": [ { "category": "description", "text": "nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfsd should drop CAP_MKNOD for non-root", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 2.1 and 3, due to these products being in Production 3 of their maintenance life-cycles, where only qualified security errata of important or critical impact are addressed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1072" }, { "category": "external", "summary": "RHBZ#491572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1072", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072" } ], "release_date": "2009-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1081" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfsd should drop CAP_MKNOD for non-root" }, { "cve": "CVE-2009-1192", "discovery_date": "2009-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "497020" } ], "notes": [ { "category": "description", "text": "The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: agp: zero pages before sending to userspace", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1192" }, { "category": "external", "summary": "RHBZ#497020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1192", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192" } ], "release_date": "2009-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1081" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: agp: zero pages before sending to userspace" }, { "cve": "CVE-2009-1338", "discovery_date": "2009-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "496031" } ], "notes": [ { "category": "description", "text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 2.6.28 does not consider PID namespaces when processing signals directed to PID -1, which allows local users to bypass the intended namespace isolation, and send arbitrary signals to all processes in all namespaces, via a kill command.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: \u0027kill sig -1\u0027 must only apply to caller\u0027s pid namespace", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1338" }, { "category": "external", "summary": "RHBZ#496031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496031" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1338", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1338" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1338", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1338" } ], "release_date": "2008-10-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1081" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: \u0027kill sig -1\u0027 must only apply to caller\u0027s pid namespace" }, { "cve": "CVE-2009-1439", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "494275" } ], "notes": [ { "category": "description", "text": "Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1439" }, { "category": "external", "summary": "RHBZ#494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1439", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439" } ], "release_date": "2009-03-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1081" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount" }, { "cve": "CVE-2009-3238", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "discovery_date": "2009-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "524512" } ], "notes": [ { "category": "description", "text": "The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function\u0027s tendency to \"return the same value over and over again for long stretches of time.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: random: add robust get_random_u32, remove weak get_random_int", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3238" }, { "category": "external", "summary": "RHBZ#524512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524512" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3238", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3238" } ], "release_date": "2009-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1081" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: random: add robust get_random_u32, remove weak get_random_int" } ] }
ghsa-j77x-557v-p2cj
Vulnerability from github
Published
2022-05-02 03:25
Modified
2022-05-02 03:25
Details
Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.
{ "affected": [], "aliases": [ "CVE-2009-1439" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2009-04-27T18:00:00Z", "severity": "HIGH" }, "details": "Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.", "id": "GHSA-j77x-557v-p2cj", "modified": "2022-05-02T03:25:15Z", "published": "2022-05-02T03:25:15Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439" }, { "type": "WEB", "url": "https://bugzilla.novell.com/show_bug.cgi?id=492282" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10321" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8265" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01126.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01271.html" }, { "type": "WEB", "url": "http://blog.fefe.de/?ts=b72905a8" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b363b3304bcf68c4541683b2eff70b29f0446a5b" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00002.html" }, { "type": "WEB", "url": "http://lists.samba.org/archive/linux-cifs-client/2009-April/004322.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/34981" }, { "type": "WEB", "url": "http://secunia.com/advisories/35011" }, { "type": "WEB", "url": "http://secunia.com/advisories/35120" }, { "type": "WEB", "url": "http://secunia.com/advisories/35121" }, { "type": "WEB", "url": "http://secunia.com/advisories/35185" }, { "type": "WEB", "url": "http://secunia.com/advisories/35217" }, { "type": "WEB", "url": "http://secunia.com/advisories/35226" }, { "type": "WEB", "url": "http://secunia.com/advisories/35343" }, { "type": "WEB", "url": "http://secunia.com/advisories/35387" }, { "type": "WEB", "url": "http://secunia.com/advisories/35390" }, { "type": "WEB", "url": "http://secunia.com/advisories/35394" }, { "type": "WEB", "url": "http://secunia.com/advisories/35656" }, { "type": "WEB", "url": "http://secunia.com/advisories/37471" }, { "type": "WEB", "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0084" }, { "type": "WEB", "url": "http://www.debian.org/security/2009/dsa-1787" }, { "type": "WEB", "url": "http://www.debian.org/security/2009/dsa-1794" }, { "type": "WEB", "url": "http://www.debian.org/security/2009/dsa-1800" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2009/04/04/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2009/04/07/3" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2009/04/07/7" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2009-1081.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/503610/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/34453" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-793-1" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "type": "WEB", "url": "http://xorl.wordpress.com/2009/04/07/linux-kernel-tree-connect-cifs-remote-buffer-overflow" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2009-1439
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2009-1439", "description": "Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.", "id": "GSD-2009-1439", "references": [ "https://www.suse.com/security/cve/CVE-2009-1439.html", "https://www.debian.org/security/2009/dsa-1800", "https://www.debian.org/security/2009/dsa-1794", "https://www.debian.org/security/2009/dsa-1787", "https://access.redhat.com/errata/RHSA-2009:1211", "https://access.redhat.com/errata/RHSA-2009:1106", "https://access.redhat.com/errata/RHSA-2009:1081", "https://linux.oracle.com/cve/CVE-2009-1439.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2009-1439" ], "details": "Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.", "id": "GSD-2009-1439", "modified": "2023-12-13T01:19:47.944027Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1439", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "35390", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35390" }, { "name": "[oss-security] 20090407 Re: CVE request? buffer overflow in CIFS in 2.6.*", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/04/07/7" }, { "name": "[oss-security] 20090405 CVE request? buffer overflow in CIFS in 2.6.*", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/04/04/1" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b363b3304bcf68c4541683b2eff70b29f0446a5b", "refsource": "CONFIRM", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b363b3304bcf68c4541683b2eff70b29f0446a5b" }, { "name": "35226", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35226" }, { "name": "SUSE-SA:2009:028", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html" }, { "name": "37471", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37471" }, { "name": "FEDORA-2009-5356", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01126.html" }, { "name": "SUSE-SA:2009:032", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00002.html" }, { "name": "35656", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35656" }, { "name": "http://xorl.wordpress.com/2009/04/07/linux-kernel-tree-connect-cifs-remote-buffer-overflow/", "refsource": "MISC", "url": "http://xorl.wordpress.com/2009/04/07/linux-kernel-tree-connect-cifs-remote-buffer-overflow/" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "oval:org.mitre.oval:def:8265", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8265" }, { "name": "DSA-1794", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1794" }, { "name": "20090516 rPSA-2009-0084-1 kernel", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/503610/100/0/threaded" }, { "name": "34453", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34453" }, { "name": "SUSE-SA:2009:030", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" }, { "name": "35185", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35185" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=494275", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "name": "35011", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35011" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "http://blog.fefe.de/?ts=b72905a8", "refsource": "MISC", "url": "http://blog.fefe.de/?ts=b72905a8" }, { "name": "[oss-security] 20090407 Re: CVE request? buffer overflow in CIFS in 2.6.*", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/04/07/3" }, { "name": "35120", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35120" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=492282", "refsource": "CONFIRM", "url": "https://bugzilla.novell.com/show_bug.cgi?id=492282" }, { "name": "SUSE-SA:2009:031", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" }, { "name": "USN-793-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-793-1" }, { "name": "FEDORA-2009-5383", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01271.html" }, { "name": "RHSA-2009:1081", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1081.html" }, { "name": "34981", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34981" }, { "name": "DSA-1800", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1800" }, { "name": "35343", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35343" }, { "name": "[linux-cifs-client] 20090406 [PATCH] cifs: Fix insufficient memory allocation for nativeFileSystem field", "refsource": "MLIST", "url": "http://lists.samba.org/archive/linux-cifs-client/2009-April/004322.html" }, { "name": "35387", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35387" }, { "name": "DSA-1787", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1787" }, { "name": "35217", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35217" }, { "name": "oval:org.mitre.oval:def:10321", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10321" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2009-0084", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0084" }, { "name": "35121", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35121" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "35394", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35394" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22_rc1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc2_git7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:git1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.6.29", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22_rc7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc8-kk:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1439" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "http://blog.fefe.de/?ts=b72905a8", "refsource": "MISC", "tags": [], "url": "http://blog.fefe.de/?ts=b72905a8" }, { "name": "[oss-security] 20090407 Re: CVE request? buffer overflow in CIFS in 2.6.*", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2009/04/07/7" }, { "name": "[oss-security] 20090405 CVE request? buffer overflow in CIFS in 2.6.*", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2009/04/04/1" }, { "name": "[oss-security] 20090407 Re: CVE request? buffer overflow in CIFS in 2.6.*", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2009/04/07/3" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=492282", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.novell.com/show_bug.cgi?id=492282" }, { "name": "[linux-cifs-client] 20090406 [PATCH] cifs: Fix insufficient memory allocation for nativeFileSystem field", "refsource": "MLIST", "tags": [], "url": "http://lists.samba.org/archive/linux-cifs-client/2009-April/004322.html" }, { "name": "34981", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/34981" }, { "name": "DSA-1787", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2009/dsa-1787" }, { "name": "DSA-1794", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2009/dsa-1794" }, { "name": "35011", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/35011" }, { "name": "http://xorl.wordpress.com/2009/04/07/linux-kernel-tree-connect-cifs-remote-buffer-overflow/", "refsource": "MISC", "tags": [], "url": "http://xorl.wordpress.com/2009/04/07/linux-kernel-tree-connect-cifs-remote-buffer-overflow/" }, { "name": "34453", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/34453" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b363b3304bcf68c4541683b2eff70b29f0446a5b", "refsource": "CONFIRM", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b363b3304bcf68c4541683b2eff70b29f0446a5b" }, { "name": "SUSE-SA:2009:028", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html" }, { "name": "35121", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/35121" }, { "name": "DSA-1800", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2009/dsa-1800" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2009-0084", "refsource": "CONFIRM", "tags": [], "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0084" }, { "name": "35185", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/35185" }, { "name": "FEDORA-2009-5356", "refsource": "FEDORA", "tags": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01126.html" }, { "name": "35226", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/35226" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=494275", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "name": "35120", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/35120" }, { "name": "RHSA-2009:1081", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2009-1081.html" }, { "name": "FEDORA-2009-5383", "refsource": "FEDORA", "tags": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01271.html" }, { "name": "35217", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/35217" }, { "name": "35390", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/35390" }, { "name": "SUSE-SA:2009:030", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" }, { "name": "35394", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/35394" }, { "name": "SUSE-SA:2009:032", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00002.html" }, { "name": "SUSE-SA:2009:031", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" }, { "name": "35387", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/35387" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "37471", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/37471" }, { "name": "USN-793-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-793-1" }, { "name": "35656", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/35656" }, { "name": "35343", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/35343" }, { "name": "oval:org.mitre.oval:def:8265", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8265" }, { "name": "oval:org.mitre.oval:def:10321", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10321" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "20090516 rPSA-2009-0084-1 kernel", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/503610/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-10T19:36Z", "publishedDate": "2009-04-27T18:00Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.