Action not permitted
Modal body text goes here.
cve-2009-3238
Vulnerability from cvelistv5
Published
2009-09-18 10:00
Modified
2024-08-07 06:22
Severity ?
EPSS score ?
Summary
The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function's tendency to "return the same value over and over again for long stretches of time."
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:22:24.084Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03836en_us" }, { "name": "USN-852-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-852-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://patchwork.kernel.org/patch/21766/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519692" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30" }, { "name": "37351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37351" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499785" }, { "name": "SUSE-SA:2010:012", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" }, { "name": "oval:org.mitre.oval:def:11168", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11168" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8a0a9bd4db63bc45e3017bedeafbd88d0eb84d02" }, { "name": "RHSA-2009:1438", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1438.html" }, { "name": "SUSE-SA:2009:054", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html" }, { "name": "37105", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37105" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-09-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function\u0027s tendency to \"return the same value over and over again for long stretches of time.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-27T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03836en_us" }, { "name": "USN-852-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-852-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://patchwork.kernel.org/patch/21766/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519692" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30" }, { "name": "37351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37351" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499785" }, { "name": "SUSE-SA:2010:012", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" }, { "name": "oval:org.mitre.oval:def:11168", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11168" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8a0a9bd4db63bc45e3017bedeafbd88d0eb84d02" }, { "name": "RHSA-2009:1438", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1438.html" }, { "name": "SUSE-SA:2009:054", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html" }, { "name": "37105", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37105" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3238", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function\u0027s tendency to \"return the same value over and over again for long stretches of time.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03836en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03836en_us" }, { "name": "USN-852-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-852-1" }, { "name": "http://patchwork.kernel.org/patch/21766/", "refsource": "CONFIRM", "url": "http://patchwork.kernel.org/patch/21766/" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=519692", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519692" }, { "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30", "refsource": "CONFIRM", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30" }, { "name": "37351", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37351" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=499785", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499785" }, { "name": "SUSE-SA:2010:012", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" }, { "name": "oval:org.mitre.oval:def:11168", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11168" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8a0a9bd4db63bc45e3017bedeafbd88d0eb84d02", "refsource": "CONFIRM", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8a0a9bd4db63bc45e3017bedeafbd88d0eb84d02" }, { "name": "RHSA-2009:1438", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1438.html" }, { "name": "SUSE-SA:2009:054", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html" }, { "name": "37105", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37105" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3238", "datePublished": "2009-09-18T10:00:00", "dateReserved": "2009-09-18T00:00:00", "dateUpdated": "2024-08-07T06:22:24.084Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2009-3238\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-09-18T10:30:01.267\",\"lastModified\":\"2024-02-15T03:30:15.317\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function\u0027s tendency to \\\"return the same value over and over again for long stretches of time.\\\"\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n get_random_int de drivers/char/random.c en el kernel de Linux anterior a v2.6.30, produce n\u00fameros que nos son suficientemente aleatorios, esto permite a los atacantes predecir el valor devuelto y permite que se puedan superar los mecanismos de protecci\u00f3n basados en la aleatoriedad, a trav\u00e9s de vectores que eleven la tendencia de la funci\u00f3n a \\\"devolver el mismo valor una y otra vez durante largos periodos de tiempo\\\".\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:N/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.8},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-338\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.30\",\"matchCriteriaId\":\"F029386E-52D4-46E9-84BF-4D24CA35383E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"7EBFE35C-E243-43D1-883D-4398D71763CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4747CC68-FAF4-482F-929A-9DA6C24CB663\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D026D0-EF78-438D-BEDD-FC8571F3ACEB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B42AB65-443B-4655-BAEA-4EB4A43D9509\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"513797E6-FCE6-4E84-9B66-202541F9601E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"22A79A35-05DB-4B9F-AD3E-EA6F933CF10C\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8a0a9bd4db63bc45e3017bedeafbd88d0eb84d02\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://patchwork.kernel.org/patch/21766/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Patch\"]},{\"url\":\"http://secunia.com/advisories/37105\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/37351\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1438.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-852-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=499785\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Permissions Required\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=519692\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Permissions Required\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11168\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03836en_us\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2009_1438
Vulnerability from csaf_redhat
Published
2009-09-15 08:19
Modified
2024-11-05 17:09
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix several security issues and several bugs
are now available for Red Hat Enterprise Linux 4.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
[Updated 21st July 2010]
Added links to KBase articles expanding on three of the fixed bugs.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security issues:
* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a
setuid or setgid program was executed. A local, unprivileged user could use
this flaw to bypass the mmap_min_addr protection mechanism and perform a
NULL pointer dereference attack, or bypass the Address Space Layout
Randomization (ASLR) security feature. (CVE-2009-1895, Important)
* it was discovered that, when executing a new process, the clear_child_tid
pointer in the Linux kernel is not cleared. If this pointer points to a
writable portion of the memory of the new program, the kernel could corrupt
four bytes of memory, possibly leading to a local denial of service or
privilege escalation. (CVE-2009-2848, Important)
* Solar Designer reported a missing capability check in the z90crypt driver
in the Linux kernel. This missing check could allow a local user with an
effective user ID (euid) of 0 to bypass intended capability restrictions.
(CVE-2009-1883, Moderate)
* a flaw was found in the way the do_sigaltstack() function in the Linux
kernel copies the stack_t structure to user-space. On 64-bit machines, this
flaw could lead to a four-byte information leak. (CVE-2009-2847, Moderate)
Bug fixes:
* the gcc flag "-fno-delete-null-pointer-checks" was added to the kernel
build options. This prevents gcc from optimizing out NULL pointer checks
after the first use of a pointer. NULL pointer bugs are often exploited by
attackers. Keeping these checks is a safety measure. (BZ#517964)
* the Emulex LPFC driver has been updated to version 8.0.16.47, which fixes
a memory leak that caused memory allocation failures and system hangs.
(BZ#513192)
* an error in the MPT Fusion driver makefile caused CSMI ioctls to not work
with Serial Attached SCSI devices. (BZ#516184)
* this update adds the mmap_min_addr tunable and restriction checks to help
prevent unprivileged users from creating new memory mappings below the
minimum address. This can help prevent the exploitation of NULL pointer
deference bugs. Note that mmap_min_addr is set to zero (disabled) by
default for backwards compatibility. (BZ#517904)
* time-outs resulted in I/O errors being logged to "/var/log/messages" when
running "mt erase" on tape drives using certain LSI MegaRAID SAS adapters,
preventing the command from completing. The megaraid_sas driver's timeout
value is now set to the OS layer value. (BZ#517965)
* a locking issue caused the qla2xxx ioctl module to hang after
encountering errors. This locking issue has been corrected. This ioctl
module is used by the QLogic SAN management tools, such as SANsurfer and
scli. (BZ#519428)
* when a RAID 1 array that uses the mptscsi driver and the LSI 1030
controller became degraded, the whole array was detected as being offline,
which could cause kernel panics at boot or data loss. (BZ#517295)
* on 32-bit architectures, if a file was held open and frequently written
for more than 25 days, it was possible that the kernel would stop flushing
those writes to storage. (BZ#515255)
* a memory allocation bug in ib_mthca prevented the driver from loading if
it was loaded with large values for the "num_mpt=" and "num_mtt=" options.
See Kbase link below for details. (BZ#518707)
* with this update, get_random_int() is more random and no longer uses a
common seed value, reducing the possibility of predicting the values
returned. See Kbase link below for details. (BZ#519692)
* a bug in __ptrace_unlink() caused it to create deadlocked and unkillable
processes. See Kbase link below for details. (BZ#519446)
* previously, multiple threads using the fcntl() F_SETLK command to
synchronize file access caused a deadlock in posix_locks_deadlock(). This
could cause a system hang. (BZ#519429)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. Reboot the system for this update to take
effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.\n\n[Updated 21st July 2010]\nAdded links to KBase articles expanding on three of the fixed bugs.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity issues:\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* it was discovered that, when executing a new process, the clear_child_tid\npointer in the Linux kernel is not cleared. If this pointer points to a\nwritable portion of the memory of the new program, the kernel could corrupt\nfour bytes of memory, possibly leading to a local denial of service or\nprivilege escalation. (CVE-2009-2848, Important)\n\n* Solar Designer reported a missing capability check in the z90crypt driver\nin the Linux kernel. This missing check could allow a local user with an\neffective user ID (euid) of 0 to bypass intended capability restrictions.\n(CVE-2009-1883, Moderate)\n\n* a flaw was found in the way the do_sigaltstack() function in the Linux\nkernel copies the stack_t structure to user-space. On 64-bit machines, this\nflaw could lead to a four-byte information leak. (CVE-2009-2847, Moderate)\n\nBug fixes:\n\n* the gcc flag \"-fno-delete-null-pointer-checks\" was added to the kernel\nbuild options. This prevents gcc from optimizing out NULL pointer checks\nafter the first use of a pointer. NULL pointer bugs are often exploited by\nattackers. Keeping these checks is a safety measure. (BZ#517964)\n\n* the Emulex LPFC driver has been updated to version 8.0.16.47, which fixes\na memory leak that caused memory allocation failures and system hangs.\n(BZ#513192)\n\n* an error in the MPT Fusion driver makefile caused CSMI ioctls to not work\nwith Serial Attached SCSI devices. (BZ#516184)\n\n* this update adds the mmap_min_addr tunable and restriction checks to help\nprevent unprivileged users from creating new memory mappings below the\nminimum address. This can help prevent the exploitation of NULL pointer\ndeference bugs. Note that mmap_min_addr is set to zero (disabled) by\ndefault for backwards compatibility. (BZ#517904)\n\n* time-outs resulted in I/O errors being logged to \"/var/log/messages\" when\nrunning \"mt erase\" on tape drives using certain LSI MegaRAID SAS adapters,\npreventing the command from completing. The megaraid_sas driver\u0027s timeout\nvalue is now set to the OS layer value. (BZ#517965)\n\n* a locking issue caused the qla2xxx ioctl module to hang after\nencountering errors. This locking issue has been corrected. This ioctl\nmodule is used by the QLogic SAN management tools, such as SANsurfer and\nscli. (BZ#519428)\n\n* when a RAID 1 array that uses the mptscsi driver and the LSI 1030\ncontroller became degraded, the whole array was detected as being offline,\nwhich could cause kernel panics at boot or data loss. (BZ#517295)\n\n* on 32-bit architectures, if a file was held open and frequently written\nfor more than 25 days, it was possible that the kernel would stop flushing\nthose writes to storage. (BZ#515255)\n\n* a memory allocation bug in ib_mthca prevented the driver from loading if\nit was loaded with large values for the \"num_mpt=\" and \"num_mtt=\" options.\nSee Kbase link below for details. (BZ#518707)\n\n* with this update, get_random_int() is more random and no longer uses a\ncommon seed value, reducing the possibility of predicting the values\nreturned. See Kbase link below for details. (BZ#519692)\n\n* a bug in __ptrace_unlink() caused it to create deadlocked and unkillable\nprocesses. See Kbase link below for details. (BZ#519446)\n\n* previously, multiple threads using the fcntl() F_SETLK command to\nsynchronize file access caused a deadlock in posix_locks_deadlock(). This\ncould cause a system hang. (BZ#519429)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. Reboot the system for this update to take\neffect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1438", "url": "https://access.redhat.com/errata/RHSA-2009:1438" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/kb/docs/DOC-24777", "url": "https://access.redhat.com/kb/docs/DOC-24777" }, { "category": "external", "summary": "https://access.redhat.com/kb/docs/DOC-24776", "url": "https://access.redhat.com/kb/docs/DOC-24776" }, { "category": "external", "summary": "https://access.redhat.com/kb/docs/DOC-24775", "url": "https://access.redhat.com/kb/docs/DOC-24775" }, { "category": "external", "summary": "505983", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=505983" }, { "category": "external", "summary": "511171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171" }, { "category": "external", "summary": "513192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513192" }, { "category": "external", "summary": "515255", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515255" }, { "category": "external", "summary": "515392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515392" }, { "category": "external", "summary": "515423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515423" }, { "category": "external", "summary": "516184", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516184" }, { "category": "external", "summary": "517295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517295" }, { "category": "external", "summary": "517904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517904" }, { "category": "external", "summary": "517964", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517964" }, { "category": "external", "summary": "517965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517965" }, { "category": "external", "summary": "518707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518707" }, { "category": "external", "summary": "519428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519428" }, { "category": "external", "summary": "519429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519429" }, { "category": "external", "summary": "519446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519446" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1438.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-05T17:09:02+00:00", "generator": { "date": "2024-11-05T17:09:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2009:1438", "initial_release_date": "2009-09-15T08:19:00+00:00", "revision_history": [ { "date": "2009-09-15T08:19:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-09-15T04:30:27+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T17:09:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.0.11.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.11.EL.i686", "product": { "name": "kernel-0:2.6.9-89.0.11.EL.i686", "product_id": "kernel-0:2.6.9-89.0.11.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.11.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.11.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.0.11.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "product": { "name": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "product_id": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.11.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-89.0.11.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-89.0.11.EL.i686", "product_id": "kernel-smp-0:2.6.9-89.0.11.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.11.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.11.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.i686", "product_id": "kernel-devel-0:2.6.9-89.0.11.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.11.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-89.0.11.EL.i686", "product": { "name": "kernel-xenU-0:2.6.9-89.0.11.EL.i686", "product_id": "kernel-xenU-0:2.6.9-89.0.11.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.11.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.11.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-89.0.11.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-89.0.11.EL.noarch", "product_id": "kernel-doc-0:2.6.9-89.0.11.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.0.11.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.0.11.EL.ia64", "product": { "name": "kernel-0:2.6.9-89.0.11.EL.ia64", "product_id": "kernel-0:2.6.9-89.0.11.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.11.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "product_id": "kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.11.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.11.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.11.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.11.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.ia64", "product_id": "kernel-devel-0:2.6.9-89.0.11.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.11.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.0.11.EL.src", "product": { "name": "kernel-0:2.6.9-89.0.11.EL.src", "product_id": "kernel-0:2.6.9-89.0.11.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.11.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.0.11.EL.x86_64", "product": { "name": "kernel-0:2.6.9-89.0.11.EL.x86_64", "product_id": "kernel-0:2.6.9-89.0.11.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.11.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "product_id": "kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.11.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.11.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.11.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "product": { "name": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "product_id": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.11.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.11.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.11.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "product": { "name": "kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "product_id": "kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.11.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.11.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.0.11.EL.ppc64", "product": { "name": "kernel-0:2.6.9-89.0.11.EL.ppc64", "product_id": "kernel-0:2.6.9-89.0.11.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.11.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "product_id": "kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.11.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.11.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.11.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.11.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.11.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.11.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.11.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.0.11.EL.s390x", "product": { "name": "kernel-0:2.6.9-89.0.11.EL.s390x", "product_id": "kernel-0:2.6.9-89.0.11.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.11.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.11.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.11.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.s390x", "product_id": "kernel-devel-0:2.6.9-89.0.11.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.11.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.0.11.EL.s390", "product": { "name": "kernel-0:2.6.9-89.0.11.EL.s390", "product_id": "kernel-0:2.6.9-89.0.11.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.11.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.11.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.11.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.s390", "product_id": "kernel-devel-0:2.6.9-89.0.11.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.11.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.11.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.11.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.11.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.11.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.11.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-89.0.11.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.11.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.11.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.11.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.11.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.11.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-89.0.11.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.11.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.11.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.11.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.11.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.11.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.11.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.11.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-89.0.11.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.11.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.11.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.11.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.11.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.11.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.11.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.11.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-89.0.11.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.11.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.11.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-1883", "discovery_date": "2009-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "505983" } ], "notes": [ { "category": "description", "text": "The z90crypt_unlocked_ioctl function in the z90crypt driver in the Linux kernel 2.6.9 does not perform a capability check for the Z90QUIESCE operation, which allows local users to leverage euid 0 privileges to force a driver outage.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: missing capability check in z90crypt", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect kernel packages as shipped in Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 1.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-0:2.6.9-89.0.11.EL.src", "4AS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.11.EL.src", "4Desktop:kernel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-0:2.6.9-89.0.11.EL.src", "4ES:kernel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-0:2.6.9-89.0.11.EL.src", "4WS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1883" }, { "category": "external", "summary": "RHBZ#505983", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=505983" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1883", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1883" } ], "release_date": "2009-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-09-15T08:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-0:2.6.9-89.0.11.EL.src", "4AS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.11.EL.src", "4Desktop:kernel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-0:2.6.9-89.0.11.EL.src", "4ES:kernel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-0:2.6.9-89.0.11.EL.src", "4WS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1438" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-0:2.6.9-89.0.11.EL.src", "4AS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.11.EL.src", "4Desktop:kernel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-0:2.6.9-89.0.11.EL.src", "4ES:kernel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-0:2.6.9-89.0.11.EL.src", "4WS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: missing capability check in z90crypt" }, { "cve": "CVE-2009-1895", "discovery_date": "2009-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "511171" } ], "notes": [ { "category": "description", "text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: personality: fix PER_CLEAR_ON_SETID", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-0:2.6.9-89.0.11.EL.src", "4AS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.11.EL.src", "4Desktop:kernel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-0:2.6.9-89.0.11.EL.src", "4ES:kernel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-0:2.6.9-89.0.11.EL.src", "4WS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1895" }, { "category": "external", "summary": "RHBZ#511171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895" } ], "release_date": "2009-06-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-09-15T08:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-0:2.6.9-89.0.11.EL.src", "4AS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.11.EL.src", "4Desktop:kernel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-0:2.6.9-89.0.11.EL.src", "4ES:kernel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-0:2.6.9-89.0.11.EL.src", "4WS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1438" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-0:2.6.9-89.0.11.EL.src", "4AS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.11.EL.src", "4Desktop:kernel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-0:2.6.9-89.0.11.EL.src", "4ES:kernel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-0:2.6.9-89.0.11.EL.src", "4WS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: personality: fix PER_CLEAR_ON_SETID" }, { "cve": "CVE-2009-2847", "discovery_date": "2009-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "515392" } ], "notes": [ { "category": "description", "text": "The do_sigaltstack function in kernel/signal.c in Linux kernel 2.4 through 2.4.37 and 2.6 before 2.6.31-rc5, when running on 64-bit systems, does not clear certain padding bytes from a structure, which allows local users to obtain sensitive information from the kernel stack via the sigaltstack function.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: information leak in sigaltstack", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed. For further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-0:2.6.9-89.0.11.EL.src", "4AS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.11.EL.src", "4Desktop:kernel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-0:2.6.9-89.0.11.EL.src", "4ES:kernel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-0:2.6.9-89.0.11.EL.src", "4WS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2847" }, { "category": "external", "summary": "RHBZ#515392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515392" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2847", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2847" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2847", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2847" } ], "release_date": "2009-07-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-09-15T08:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-0:2.6.9-89.0.11.EL.src", "4AS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.11.EL.src", "4Desktop:kernel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-0:2.6.9-89.0.11.EL.src", "4ES:kernel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-0:2.6.9-89.0.11.EL.src", "4WS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1438" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-0:2.6.9-89.0.11.EL.src", "4AS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.11.EL.src", "4Desktop:kernel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-0:2.6.9-89.0.11.EL.src", "4ES:kernel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-0:2.6.9-89.0.11.EL.src", "4WS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: information leak in sigaltstack" }, { "cve": "CVE-2009-2848", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "515423" } ], "notes": [ { "category": "description", "text": "The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current-\u003eclear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: execve: must clear current-\u003eclear_child_tid", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-0:2.6.9-89.0.11.EL.src", "4AS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.11.EL.src", "4Desktop:kernel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-0:2.6.9-89.0.11.EL.src", "4ES:kernel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-0:2.6.9-89.0.11.EL.src", "4WS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2848" }, { "category": "external", "summary": "RHBZ#515423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515423" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2848", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2848" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2848", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2848" } ], "release_date": "2009-07-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-09-15T08:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-0:2.6.9-89.0.11.EL.src", "4AS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.11.EL.src", "4Desktop:kernel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-0:2.6.9-89.0.11.EL.src", "4ES:kernel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-0:2.6.9-89.0.11.EL.src", "4WS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1438" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-0:2.6.9-89.0.11.EL.src", "4AS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.11.EL.src", "4Desktop:kernel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-0:2.6.9-89.0.11.EL.src", "4ES:kernel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-0:2.6.9-89.0.11.EL.src", "4WS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: execve: must clear current-\u003eclear_child_tid" }, { "cve": "CVE-2009-3238", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "discovery_date": "2009-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "524512" } ], "notes": [ { "category": "description", "text": "The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function\u0027s tendency to \"return the same value over and over again for long stretches of time.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: random: add robust get_random_u32, remove weak get_random_int", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-0:2.6.9-89.0.11.EL.src", "4AS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.11.EL.src", "4Desktop:kernel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-0:2.6.9-89.0.11.EL.src", "4ES:kernel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-0:2.6.9-89.0.11.EL.src", "4WS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3238" }, { "category": "external", "summary": "RHBZ#524512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524512" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3238", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3238" } ], "release_date": "2009-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-09-15T08:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-0:2.6.9-89.0.11.EL.src", "4AS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.11.EL.src", "4Desktop:kernel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-0:2.6.9-89.0.11.EL.src", "4ES:kernel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-0:2.6.9-89.0.11.EL.src", "4WS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1438" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-0:2.6.9-89.0.11.EL.src", "4AS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.11.EL.src", "4Desktop:kernel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-0:2.6.9-89.0.11.EL.src", "4ES:kernel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-0:2.6.9-89.0.11.EL.src", "4WS:kernel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.11.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.11.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.11.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: random: add robust get_random_u32, remove weak get_random_int" } ] }
rhsa-2009_1081
Vulnerability from csaf_redhat
Published
2009-06-03 15:36
Modified
2024-11-05 17:05
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
Updated kernel-rt packages that fix several security issues and various
bugs are now available for Red Hat Enterprise MRG 1.1.3.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel-rt packages contain the Linux kernel, the core of any Linux
operating system.
These updated packages fix the following security issues:
* a buffer overflow flaw was found in the CIFSTCon() function of the Linux
kernel Common Internet File System (CIFS) implementation. When mounting a
CIFS share, a malicious server could send an overly-long string to the
client, possibly leading to a denial of service or privilege escalation on
the client mounting the CIFS share. (CVE-2009-1439, Important)
* the Linux kernel Network File System daemon (nfsd) implementation did not
drop the CAP_MKNOD capability when handling requests from local,
unprivileged users. This flaw could possibly lead to an information leak or
privilege escalation. (CVE-2009-1072, Moderate)
* a deficiency was found in the Linux kernel signals implementation. The
kill_something_info() function did not check if a process was outside the
caller's namespace before sending the kill signal, making it possible to
kill processes in all process ID (PID) namespaces, breaking PID namespace
isolation. (CVE-2009-1338, Moderate)
* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and
agp_generic_alloc_pages() functions did not zero out the memory pages they
allocate, which may later be available to user-space processes. This flaw
could possibly lead to an information leak. (CVE-2009-1192, Low)
These updated packages also fix the following bugs:
* the "-fwrapv" flag was added to the gcc build options to prevent gcc from
optimizing away wrapping arithmetic, as optimizing away wrapping may lead
to unexpected results. (BZ#491264)
* the bnx2x driver may have failed when highly-stressed by network
stress-tests, resulting in network access being unavailable. This driver
has been updated to resolve this issue. (BZ#495472)
* the file system mask, which lists capabilities for users with a file
system user ID (fsuid) of 0, was missing the CAP_MKNOD and
CAP_LINUX_IMMUTABLE capabilities. This could, potentially, allow users with
an fsuid other than 0 to perform actions on some file system types that
would otherwise be prevented. This update adds these capabilities.
(BZ#497047)
* "/proc/[pid]/maps" and "/proc/[pid]/smaps" can only be read by processes
able to use the ptrace() call on a given process; however, certain
information from "/proc/[pid]/stat" and "/proc/[pid]/wchan" could be used
to reconstruct memory maps, making it possible to bypass the Address Space
Layout Randomization (ASLR) security feature. This update addresses this
issue. (BZ#499550)
* the get_random_int() function returned the same number until the jiffies
counter (which ticks at a clock interrupt frequency) or process ID (PID)
changed, making it possible to predict the random numbers. This may have
helped to bypass the ASLR security feature. With this update,
get_random_int() is more random and no longer uses a common seed value.
This reduces the possibility of predicting the values get_random_int()
returns. (BZ#499787)
All Red Hat Enterprise MRG users should upgrade to these updated packages,
which contain backported patches to resolve these issues. Note: The system
must be rebooted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel-rt packages that fix several security issues and various\nbugs are now available for Red Hat Enterprise MRG 1.1.3.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a buffer overflow flaw was found in the CIFSTCon() function of the Linux\nkernel Common Internet File System (CIFS) implementation. When mounting a\nCIFS share, a malicious server could send an overly-long string to the\nclient, possibly leading to a denial of service or privilege escalation on\nthe client mounting the CIFS share. (CVE-2009-1439, Important)\n\n* the Linux kernel Network File System daemon (nfsd) implementation did not\ndrop the CAP_MKNOD capability when handling requests from local,\nunprivileged users. This flaw could possibly lead to an information leak or\nprivilege escalation. (CVE-2009-1072, Moderate)\n\n* a deficiency was found in the Linux kernel signals implementation. The\nkill_something_info() function did not check if a process was outside the\ncaller\u0027s namespace before sending the kill signal, making it possible to\nkill processes in all process ID (PID) namespaces, breaking PID namespace\nisolation. (CVE-2009-1338, Moderate)\n\n* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and\nagp_generic_alloc_pages() functions did not zero out the memory pages they\nallocate, which may later be available to user-space processes. This flaw\ncould possibly lead to an information leak. (CVE-2009-1192, Low)\n\nThese updated packages also fix the following bugs:\n\n* the \"-fwrapv\" flag was added to the gcc build options to prevent gcc from\noptimizing away wrapping arithmetic, as optimizing away wrapping may lead\nto unexpected results. (BZ#491264)\n\n* the bnx2x driver may have failed when highly-stressed by network\nstress-tests, resulting in network access being unavailable. This driver\nhas been updated to resolve this issue. (BZ#495472)\n\n* the file system mask, which lists capabilities for users with a file\nsystem user ID (fsuid) of 0, was missing the CAP_MKNOD and\nCAP_LINUX_IMMUTABLE capabilities. This could, potentially, allow users with\nan fsuid other than 0 to perform actions on some file system types that\nwould otherwise be prevented. This update adds these capabilities.\n(BZ#497047)\n\n* \"/proc/[pid]/maps\" and \"/proc/[pid]/smaps\" can only be read by processes\nable to use the ptrace() call on a given process; however, certain\ninformation from \"/proc/[pid]/stat\" and \"/proc/[pid]/wchan\" could be used\nto reconstruct memory maps, making it possible to bypass the Address Space\nLayout Randomization (ASLR) security feature. This update addresses this\nissue. (BZ#499550)\n\n* the get_random_int() function returned the same number until the jiffies\ncounter (which ticks at a clock interrupt frequency) or process ID (PID)\nchanged, making it possible to predict the random numbers. This may have\nhelped to bypass the ASLR security feature. With this update,\nget_random_int() is more random and no longer uses a common seed value.\nThis reduces the possibility of predicting the values get_random_int()\nreturns. (BZ#499787)\n\nAll Red Hat Enterprise MRG users should upgrade to these updated packages,\nwhich contain backported patches to resolve these issues. Note: The system\nmust be rebooted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1081", "url": "https://access.redhat.com/errata/RHSA-2009:1081" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "491264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491264" }, { "category": "external", "summary": "491572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572" }, { "category": "external", "summary": "494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "495472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495472" }, { "category": "external", "summary": "496031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496031" }, { "category": "external", "summary": "497020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020" }, { "category": "external", "summary": "497047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497047" }, { "category": "external", "summary": "499550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499550" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1081.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-05T17:05:17+00:00", "generator": { "date": "2024-11-05T17:05:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2009:1081", "initial_release_date": "2009-06-03T15:36:00+00:00", "revision_history": [ { "date": "2009-06-03T15:36:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-06-03T11:36:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T17:05:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "MRG Realtime for RHEL 5 Server", "product": { "name": "MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-5" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-117.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "product": { "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "product_id": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-117.el5rt?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-117.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "product": { "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "product_id": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-117.el5rt?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "product": { "name": "kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "product_id": "kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-117.el5rt?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-117.el5rt.src", "product": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.src", "product_id": "kernel-rt-0:2.6.24.7-117.el5rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-117.el5rt?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.src as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src" }, "product_reference": "kernel-rt-0:2.6.24.7-117.el5rt.src", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch" }, "product_reference": "kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-1072", "discovery_date": "2009-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "491572" } ], "notes": [ { "category": "description", "text": "nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfsd should drop CAP_MKNOD for non-root", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 2.1 and 3, due to these products being in Production 3 of their maintenance life-cycles, where only qualified security errata of important or critical impact are addressed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1072" }, { "category": "external", "summary": "RHBZ#491572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1072", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072" } ], "release_date": "2009-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1081" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfsd should drop CAP_MKNOD for non-root" }, { "cve": "CVE-2009-1192", "discovery_date": "2009-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "497020" } ], "notes": [ { "category": "description", "text": "The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: agp: zero pages before sending to userspace", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1192" }, { "category": "external", "summary": "RHBZ#497020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1192", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192" } ], "release_date": "2009-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1081" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: agp: zero pages before sending to userspace" }, { "cve": "CVE-2009-1338", "discovery_date": "2009-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "496031" } ], "notes": [ { "category": "description", "text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 2.6.28 does not consider PID namespaces when processing signals directed to PID -1, which allows local users to bypass the intended namespace isolation, and send arbitrary signals to all processes in all namespaces, via a kill command.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: \u0027kill sig -1\u0027 must only apply to caller\u0027s pid namespace", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1338" }, { "category": "external", "summary": "RHBZ#496031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496031" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1338", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1338" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1338", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1338" } ], "release_date": "2008-10-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1081" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: \u0027kill sig -1\u0027 must only apply to caller\u0027s pid namespace" }, { "cve": "CVE-2009-1439", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "494275" } ], "notes": [ { "category": "description", "text": "Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1439" }, { "category": "external", "summary": "RHBZ#494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1439", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439" } ], "release_date": "2009-03-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1081" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount" }, { "cve": "CVE-2009-3238", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "discovery_date": "2009-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "524512" } ], "notes": [ { "category": "description", "text": "The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function\u0027s tendency to \"return the same value over and over again for long stretches of time.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: random: add robust get_random_u32, remove weak get_random_int", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3238" }, { "category": "external", "summary": "RHBZ#524512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524512" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3238", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3238" } ], "release_date": "2009-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1081" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-117.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-117.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-117.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: random: add robust get_random_u32, remove weak get_random_int" } ] }
rhsa-2009_1106
Vulnerability from csaf_redhat
Published
2009-06-16 21:21
Modified
2024-11-05 17:05
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix several security issues and several bugs
are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security fixes:
* several flaws were found in the way the Linux kernel CIFS implementation
handles Unicode strings. CIFS clients convert Unicode strings sent by a
server to their local character sets, and then write those strings into
memory. If a malicious server sent a long enough string, it could write
past the end of the target memory region and corrupt other memory areas,
possibly leading to a denial of service or privilege escalation on the
client mounting the CIFS share. (CVE-2009-1439, CVE-2009-1633, Important)
* the Linux kernel Network File System daemon (nfsd) implementation did not
drop the CAP_MKNOD capability when handling requests from local,
unprivileged users. This flaw could possibly lead to an information leak or
privilege escalation. (CVE-2009-1072, Moderate)
* Frank Filz reported the NFSv4 client was missing a file permission check
for the execute bit in some situations. This could allow local,
unprivileged users to run non-executable files on NFSv4 mounted file
systems. (CVE-2009-1630, Moderate)
* a missing check was found in the hypervisor_callback() function in the
Linux kernel provided by the kernel-xen package. This could cause a denial
of service of a 32-bit guest if an application running in that guest
accesses a certain memory location in the kernel. (CVE-2009-1758, Moderate)
* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and
agp_generic_alloc_pages() functions did not zero out the memory pages they
allocate, which may later be available to user-space processes. This flaw
could possibly lead to an information leak. (CVE-2009-1192, Low)
Bug fixes:
* a race in the NFS client between destroying cached access rights and
unmounting an NFS file system could have caused a system crash. "Busy
inodes" messages may have been logged. (BZ#498653)
* nanosleep() could sleep several milliseconds less than the specified time
on Intel Itanium®-based systems. (BZ#500349)
* LEDs for disk drives in AHCI mode may have displayed a fault state when
there were no faults. (BZ#500120)
* ptrace_do_wait() reported tasks were stopped each time the process doing
the trace called wait(), instead of reporting it once. (BZ#486945)
* epoll_wait() may have caused a system lockup and problems for
applications. (BZ#497322)
* missing capabilities could possibly allow users with an fsuid other than
0 to perform actions on some file system types that would otherwise be
prevented. (BZ#497271)
* on NFS mounted file systems, heavy write loads may have blocked
nfs_getattr() for long periods, causing commands that use stat(2), such as
ls, to hang. (BZ#486926)
* in rare circumstances, if an application performed multiple O_DIRECT
reads per virtual memory page and also performed fork(2), the buffer
storing the result of the I/O may have ended up with invalid data.
(BZ#486921)
* when using GFS2, gfs2_quotad may have entered an uninterpretable sleep
state. (BZ#501742)
* with this update, get_random_int() is more random and no longer uses a
common seed value, reducing the possibility of predicting the values
returned. (BZ#499783)
* the "-fwrapv" flag was added to the gcc build options to prevent gcc from
optimizing away wrapping. (BZ#501751)
* a kernel panic when enabling and disabling iSCSI paths. (BZ#502916)
* using the Broadcom NetXtreme BCM5704 network device with the tg3 driver
caused high system load and very bad performance. (BZ#502837)
* "/proc/[pid]/maps" and "/proc/[pid]/smaps" can only be read by processes
able to use the ptrace() call on a given process; however, certain
information from "/proc/[pid]/stat" and "/proc/[pid]/wchan" could be used
to reconstruct memory maps. (BZ#499546)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* several flaws were found in the way the Linux kernel CIFS implementation\nhandles Unicode strings. CIFS clients convert Unicode strings sent by a\nserver to their local character sets, and then write those strings into\nmemory. If a malicious server sent a long enough string, it could write\npast the end of the target memory region and corrupt other memory areas,\npossibly leading to a denial of service or privilege escalation on the\nclient mounting the CIFS share. (CVE-2009-1439, CVE-2009-1633, Important)\n\n* the Linux kernel Network File System daemon (nfsd) implementation did not\ndrop the CAP_MKNOD capability when handling requests from local,\nunprivileged users. This flaw could possibly lead to an information leak or\nprivilege escalation. (CVE-2009-1072, Moderate)\n\n* Frank Filz reported the NFSv4 client was missing a file permission check\nfor the execute bit in some situations. This could allow local,\nunprivileged users to run non-executable files on NFSv4 mounted file\nsystems. (CVE-2009-1630, Moderate)\n\n* a missing check was found in the hypervisor_callback() function in the\nLinux kernel provided by the kernel-xen package. This could cause a denial\nof service of a 32-bit guest if an application running in that guest\naccesses a certain memory location in the kernel. (CVE-2009-1758, Moderate)\n\n* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and\nagp_generic_alloc_pages() functions did not zero out the memory pages they\nallocate, which may later be available to user-space processes. This flaw\ncould possibly lead to an information leak. (CVE-2009-1192, Low)\n\nBug fixes:\n\n* a race in the NFS client between destroying cached access rights and\nunmounting an NFS file system could have caused a system crash. \"Busy\ninodes\" messages may have been logged. (BZ#498653)\n\n* nanosleep() could sleep several milliseconds less than the specified time\non Intel Itanium\u00ae-based systems. (BZ#500349)\n\n* LEDs for disk drives in AHCI mode may have displayed a fault state when\nthere were no faults. (BZ#500120)\n\n* ptrace_do_wait() reported tasks were stopped each time the process doing\nthe trace called wait(), instead of reporting it once. (BZ#486945)\n\n* epoll_wait() may have caused a system lockup and problems for\napplications. (BZ#497322)\n\n* missing capabilities could possibly allow users with an fsuid other than\n0 to perform actions on some file system types that would otherwise be\nprevented. (BZ#497271)\n\n* on NFS mounted file systems, heavy write loads may have blocked\nnfs_getattr() for long periods, causing commands that use stat(2), such as\nls, to hang. (BZ#486926)\n\n* in rare circumstances, if an application performed multiple O_DIRECT\nreads per virtual memory page and also performed fork(2), the buffer\nstoring the result of the I/O may have ended up with invalid data.\n(BZ#486921)\n\n* when using GFS2, gfs2_quotad may have entered an uninterpretable sleep\nstate. (BZ#501742)\n\n* with this update, get_random_int() is more random and no longer uses a\ncommon seed value, reducing the possibility of predicting the values\nreturned. (BZ#499783)\n\n* the \"-fwrapv\" flag was added to the gcc build options to prevent gcc from\noptimizing away wrapping. (BZ#501751)\n\n* a kernel panic when enabling and disabling iSCSI paths. (BZ#502916)\n\n* using the Broadcom NetXtreme BCM5704 network device with the tg3 driver\ncaused high system load and very bad performance. (BZ#502837)\n\n* \"/proc/[pid]/maps\" and \"/proc/[pid]/smaps\" can only be read by processes\nable to use the ptrace() call on a given process; however, certain\ninformation from \"/proc/[pid]/stat\" and \"/proc/[pid]/wchan\" could be used\nto reconstruct memory maps. (BZ#499546)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1106", "url": "https://access.redhat.com/errata/RHSA-2009:1106" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "486921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486921" }, { "category": "external", "summary": "486926", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486926" }, { "category": "external", "summary": "486945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486945" }, { "category": "external", "summary": "491572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572" }, { "category": "external", "summary": "494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "496572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572" }, { "category": "external", "summary": "497020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020" }, { "category": "external", "summary": "497322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497322" }, { "category": "external", "summary": "498653", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=498653" }, { "category": "external", "summary": "499546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499546" }, { "category": "external", "summary": "500120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500120" }, { "category": "external", "summary": "500297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297" }, { "category": "external", "summary": "500349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500349" }, { "category": "external", "summary": "500945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500945" }, { "category": "external", "summary": "501742", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501742" }, { "category": "external", "summary": "501751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501751" }, { "category": "external", "summary": "502837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502837" }, { "category": "external", "summary": "502916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502916" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1106.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-05T17:05:24+00:00", "generator": { "date": "2024-11-05T17:05:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2009:1106", "initial_release_date": "2009-06-16T21:21:00+00:00", "revision_history": [ { "date": "2009-06-16T21:21:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-06-16T18:34:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T17:05:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.14.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.14.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.src", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.src", "product_id": "kernel-0:2.6.18-128.1.14.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "product_id": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-128.1.14.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.14.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.1.14.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.1.14.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.src" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-128.1.14.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.src" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-128.1.14.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-1072", "discovery_date": "2009-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "491572" } ], "notes": [ { "category": "description", "text": "nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfsd should drop CAP_MKNOD for non-root", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 2.1 and 3, due to these products being in Production 3 of their maintenance life-cycles, where only qualified security errata of important or critical impact are addressed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1072" }, { "category": "external", "summary": "RHBZ#491572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1072", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072" } ], "release_date": "2009-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfsd should drop CAP_MKNOD for non-root" }, { "cve": "CVE-2009-1192", "discovery_date": "2009-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "497020" } ], "notes": [ { "category": "description", "text": "The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: agp: zero pages before sending to userspace", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1192" }, { "category": "external", "summary": "RHBZ#497020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1192", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192" } ], "release_date": "2009-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: agp: zero pages before sending to userspace" }, { "cve": "CVE-2009-1439", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "494275" } ], "notes": [ { "category": "description", "text": "Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1439" }, { "category": "external", "summary": "RHBZ#494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1439", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439" } ], "release_date": "2009-03-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount" }, { "cve": "CVE-2009-1630", "discovery_date": "2009-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "500297" } ], "notes": [ { "category": "description", "text": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1630" }, { "category": "external", "summary": "RHBZ#500297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1630", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630" } ], "release_date": "2009-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission" }, { "cve": "CVE-2009-1633", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-04-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "496572" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1633" }, { "category": "external", "summary": "RHBZ#496572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1633", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633" } ], "release_date": "2009-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server" }, { "cve": "CVE-2009-1758", "discovery_date": "2009-05-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "500945" } ], "notes": [ { "category": "description", "text": "The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in \"certain address ranges.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xen: local denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and Red Hat Enterprise MRG.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1758" }, { "category": "external", "summary": "RHBZ#500945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1758", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1758" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1758", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1758" } ], "release_date": "2009-05-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: xen: local denial of service" }, { "cve": "CVE-2009-3238", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "discovery_date": "2009-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "524512" } ], "notes": [ { "category": "description", "text": "The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function\u0027s tendency to \"return the same value over and over again for long stretches of time.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: random: add robust get_random_u32, remove weak get_random_int", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3238" }, { "category": "external", "summary": "RHBZ#524512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524512" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3238", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3238" } ], "release_date": "2009-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: random: add robust get_random_u32, remove weak get_random_int" } ] }
gsd-2009-3238
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function's tendency to "return the same value over and over again for long stretches of time."
Aliases
Aliases
{ "GSD": { "alias": "CVE-2009-3238", "description": "The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function\u0027s tendency to \"return the same value over and over again for long stretches of time.\"", "id": "GSD-2009-3238", "references": [ "https://www.suse.com/security/cve/CVE-2009-3238.html", "https://www.debian.org/security/2009/dsa-1928", "https://www.debian.org/security/2009/dsa-1929", "https://www.debian.org/security/2009/dsa-1927", "https://access.redhat.com/errata/RHSA-2009:1438", "https://access.redhat.com/errata/RHSA-2009:1106", "https://access.redhat.com/errata/RHSA-2009:1081", "https://linux.oracle.com/cve/CVE-2009-3238.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2009-3238" ], "details": "The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function\u0027s tendency to \"return the same value over and over again for long stretches of time.\"", "id": "GSD-2009-3238", "modified": "2023-12-13T01:19:49.190146Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3238", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function\u0027s tendency to \"return the same value over and over again for long stretches of time.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03836en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03836en_us" }, { "name": "USN-852-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-852-1" }, { "name": "http://patchwork.kernel.org/patch/21766/", "refsource": "CONFIRM", "url": "http://patchwork.kernel.org/patch/21766/" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=519692", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519692" }, { "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30", "refsource": "CONFIRM", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30" }, { "name": "37351", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37351" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=499785", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499785" }, { "name": "SUSE-SA:2010:012", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" }, { "name": "oval:org.mitre.oval:def:11168", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11168" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8a0a9bd4db63bc45e3017bedeafbd88d0eb84d02", "refsource": "CONFIRM", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8a0a9bd4db63bc45e3017bedeafbd88d0eb84d02" }, { "name": "RHSA-2009:1438", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1438.html" }, { "name": "SUSE-SA:2009:054", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html" }, { "name": "37105", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37105" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F029386E-52D4-46E9-84BF-4D24CA35383E", "versionEndExcluding": "2.6.30", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "1B42AB65-443B-4655-BAEA-4EB4A43D9509", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*", "matchCriteriaId": "513797E6-FCE6-4E84-9B66-202541F9601E", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*", "matchCriteriaId": "22A79A35-05DB-4B9F-AD3E-EA6F933CF10C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function\u0027s tendency to \"return the same value over and over again for long stretches of time.\"" }, { "lang": "es", "value": "La funci\u00f3n get_random_int de drivers/char/random.c en el kernel de Linux anterior a v2.6.30, produce n\u00fameros que nos son suficientemente aleatorios, esto permite a los atacantes predecir el valor devuelto y permite que se puedan superar los mecanismos de protecci\u00f3n basados en la aleatoriedad, a trav\u00e9s de vectores que eleven la tendencia de la funci\u00f3n a \"devolver el mismo valor una y otra vez durante largos periodos de tiempo\"." } ], "id": "CVE-2009-3238", "lastModified": "2024-02-15T03:30:15.317", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2009-09-18T10:30:01.267", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8a0a9bd4db63bc45e3017bedeafbd88d0eb84d02" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch" ], "url": "http://patchwork.kernel.org/patch/21766/" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/37105" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/37351" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Exploit", "Vendor Advisory" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1438.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-852-1" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Permissions Required" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499785" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Permissions Required" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519692" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11168" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03836en_us" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-338" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
ghsa-gq5x-hvxj-cp4r
Vulnerability from github
Published
2022-05-02 03:43
Modified
2022-05-02 03:43
Details
The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function's tendency to "return the same value over and over again for long stretches of time."
{ "affected": [], "aliases": [ "CVE-2009-3238" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2009-09-18T10:30:00Z", "severity": "HIGH" }, "details": "The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function\u0027s tendency to \"return the same value over and over again for long stretches of time.\"", "id": "GHSA-gq5x-hvxj-cp4r", "modified": "2022-05-02T03:43:04Z", "published": "2022-05-02T03:43:04Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3238" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499785" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519692" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11168" }, { "type": "WEB", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03836en_us" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8a0a9bd4db63bc45e3017bedeafbd88d0eb84d02" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" }, { "type": "WEB", "url": "http://patchwork.kernel.org/patch/21766" }, { "type": "WEB", "url": "http://secunia.com/advisories/37105" }, { "type": "WEB", "url": "http://secunia.com/advisories/37351" }, { "type": "WEB", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2009-1438.html" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-852-1" } ], "schema_version": "1.4.0", "severity": [] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.