Action not permitted
Modal body text goes here.
cve-2009-3726
Vulnerability from cvelistv5
Published
2009-11-09 19:00
Modified
2024-08-07 06:38
Severity ?
EPSS score ?
Summary
The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:38:30.347Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529227" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d953126a28f97ec965d23c69fd5795854c048f30" }, { "name": "oval:org.mitre.oval:def:9734", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9734" }, { "name": "SUSE-SA:2009:061", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html" }, { "name": "USN-864-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-864-1" }, { "name": "38794", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38794" }, { "name": "[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000082.html" }, { "name": "36936", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36936" }, { "name": "MDVSA-2009:329", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:329" }, { "name": "oval:org.mitre.oval:def:6636", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6636" }, { "name": "SUSE-SA:2009:056", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html" }, { "name": "SUSE-SA:2010:012", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" }, { "name": "37909", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37909" }, { "name": "RHSA-2010:0474", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0474.html" }, { "name": "RHSA-2009:1670", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1670.html" }, { "name": "MDVSA-2011:051", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051" }, { "name": "SUSE-SA:2009:064", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html" }, { "name": "38834", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38834" }, { "name": "40218", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40218" }, { "name": "[linux-nfs] 20081022 kernel oops in nfs4_proc_lock", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.spinics.net/linux/lists/linux-nfs/msg03357.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.31/ChangeLog-2.6.31-rc4" }, { "name": "[oss-security] 20091105 CVE request: kernel: NULL pointer dereference in nfs4_proc_lock()", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/11/05/1" }, { "name": "[oss-security] 20091105 Re: CVE request: kernel: NULL pointer dereference in nfs4_proc_lock()", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/11/05/4" }, { "name": "DSA-2005", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2005" }, { "name": "ADV-2010-0528", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0528" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-07-22T00:00:00", "descriptions": [ { "lang": "en", "value": "The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529227" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d953126a28f97ec965d23c69fd5795854c048f30" }, { "name": "oval:org.mitre.oval:def:9734", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9734" }, { "name": "SUSE-SA:2009:061", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html" }, { "name": "USN-864-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-864-1" }, { "name": "38794", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38794" }, { "name": "[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000082.html" }, { "name": "36936", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36936" }, { "name": "MDVSA-2009:329", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:329" }, { "name": "oval:org.mitre.oval:def:6636", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6636" }, { "name": "SUSE-SA:2009:056", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html" }, { "name": "SUSE-SA:2010:012", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" }, { "name": "37909", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37909" }, { "name": "RHSA-2010:0474", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0474.html" }, { "name": "RHSA-2009:1670", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1670.html" }, { "name": "MDVSA-2011:051", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051" }, { "name": "SUSE-SA:2009:064", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html" }, { "name": "38834", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38834" }, { "name": "40218", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40218" }, { "name": "[linux-nfs] 20081022 kernel oops in nfs4_proc_lock", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.spinics.net/linux/lists/linux-nfs/msg03357.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.31/ChangeLog-2.6.31-rc4" }, { "name": "[oss-security] 20091105 CVE request: kernel: NULL pointer dereference in nfs4_proc_lock()", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/11/05/1" }, { "name": "[oss-security] 20091105 Re: CVE request: kernel: NULL pointer dereference in nfs4_proc_lock()", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/11/05/4" }, { "name": "DSA-2005", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2005" }, { "name": "ADV-2010-0528", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0528" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2009-3726", "datePublished": "2009-11-09T19:00:00", "dateReserved": "2009-10-16T00:00:00", "dateUpdated": "2024-08-07T06:38:30.347Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2009-3726\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2009-11-09T19:30:00.360\",\"lastModified\":\"2023-02-13T02:20:32.797\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n nfs4_proc_lock en fs/nfs/nfs4proc.c en el cliente NFSv4 en el Kernel de Linux\\r\\nanteriores a v2.6.31-rc4 permite a servidores NFS remotos provocar una denegaci\u00f3n de servicio (desreferenciaci\u00f3n de puntero NULL y p\u00e1nico) si se env\u00eda cierta respuesta conteniendo atributos de fichero no correctos, lo que provoca un intento de uso de un fichero abierto que carece de un estado NFSv4.\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat is aware of this issue and is tracking it via the following bug:\\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2009-3726.\\n\\nThe Linux kernel as shipped with Red Hat Enterprise Linux 3 did not have support for NFSv4, and therefore is not affected by this issue.\\n\\nIt was addressed in Red Hat Enterprise Linux 5, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2009-1670.html and https://rhn.redhat.com/errata/RHSA-2009-1635.html respectively.\\n\\nA future kernel update in Red Hat Enterprise Linux 4 will address this issue.\",\"lastModified\":\"2009-12-17T00:00:00\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":7.8},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:rc3:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.31\",\"matchCriteriaId\":\"F5DB57A3-D3BA-4AFA-B5B7-8285D239E399\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43F9DBB0-8AF7-42CA-95DD-68A344E9D549\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F49A384-7222-41F3-9BE1-4E18C00E50A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05520FE3-C48D-42E8-BC24-C2396BD46CBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D865FBB6-E07D-492F-A75E-168B06C8ADEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"598F24C2-0366-4799-865C-5EE4572B734B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0399660-6385-45AB-9785-E504D8788146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCBC50EA-130C-41B7-83EA-C523B3C3AAD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B91F6CBE-400F-4D0B-B893-34577B47A342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1548ECFD-FCB5-4AE0-9788-42F61F25489F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ABB9787-5497-4BDC-8952-F99CF60A89BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615F6BA2-CD51-4159-B28A-A018CA9FC25C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"093848CB-68A1-4258-8357-373A477FE4E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E275F440-A427-465F-B314-BF0730C781DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98651D39-60CF-409F-8276-DBBB56B972AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"067B8E09-C923-4DDA-92DB-4A2892CB526A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EBE3738-E530-4EC6-9FC6-1A063605BE05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F677E992-8D37-438F-97DF-9D98B28F020C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"476687F9-722B-490C-BD0B-B5F2CD7891DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A399D94B-D08D-4454-A07A-6634C9AE612F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9336ABDF-9928-49F6-BAA7-D6E9829F9B1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"040991B8-FB4B-480B-B53B-AA7A884F9F19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59688C40-C92F-431E-ADD7-6782622862D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E120257D-346B-4BA6-A431-E6F820FBB5FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"361D407D-A4BE-491D-BC8E-32E78DC4A8F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.29:-rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"965725B8-8501-4C33-9B7F-4AC2865616B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.29:-rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ED02D9F-6BEE-475F-B080-6F712E176A00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3CD7983-4EB2-4D17-9332-493ECBADC284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAB7E049-4B49-4FB5-815B-39CEAEDE6ACC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"637A08D0-E382-4DE8-AEEC-6A53A72849B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"550DFE6E-DCE6-4649-8746-522996021DBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E17BB496-749A-40C8-BAA9-6CFBBE308065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C30F255-1297-46EA-9FBC-05564792FF65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.34.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E283E518-3A3E-4D39-B11F-E4B71D6ADF90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.34.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB58C532-186F-4C1F-A107-1BF17C19AA15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.34.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A31F446-FB7E-4D6C-8703-0A730E2C71AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.34.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52BA2E08-09BC-4EE4-822E-0F6FEF92E721\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.35.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97AA815F-E07C-4989-B190-D5E52451D0BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.35.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFFCA2ED-2384-4DB7-9634-AEAEDFF57817\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.35.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C171597-F06E-48BA-A897-E753ECBEE68C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.35.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99E0D1AD-E8B0-4125-BCA7-8487D9490EBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.35.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F99F78D3-A2FA-4033-8E21-FE3FFCE9D94B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA39D4CE-22F0-46A2-B8CF-4599675E7D3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDD00664-A27C-4514-A2A4-079E8F9B0251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E336C792-B7A1-4318-8050-DE9F03474CEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7228AE50-BACB-4AB8-9CE5-17DB0CD661AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6D260FD-E55E-4A95-AB7F-B880DBE37BAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E36D0159-1A05-4628-9C1C-360DED0F438C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E6654B9-42EB-4C2C-8F71-710D50556180\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"086E5B7B-A31B-44A1-92CF-D88E118545D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAC24F28-2C48-43D7-B8FB-7DCF499C9627\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76B549FD-5315-4DB1-8A3B-76B2E28DDDBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E506CC5-BB82-423E-A99A-F77A4C8CA26B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.37:-rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5561C408-CFDD-47F7-A430-ADF47007F8E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.37.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B075A26C-356F-41A5-A2AB-4AB130F4B503\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.37.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BE7521F-BC6A-470A-AF3D-36E9243330E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.37.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37E510D6-5ED5-4EF8-BEFB-B84FDCF44F5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.37.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E6FEE93-0FCB-4289-9F76-540A1E48950F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.37.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08A8E327-3DFD-4109-93EB-23A5C12ED933\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.37.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD9B5D95-0E69-4A33-8A6E-B6FF852A8866\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FC560CC-F785-42D5-A25B-1BA02E7AC464\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142BCD48-8387-4D0C-A052-44DD4144CBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8220D81-9065-471F-9256-CFE7B9941555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB445E3E-CCBD-4737-BE30-841B9A79D558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D90502F-EC45-4ADC-9428-B94346DA660B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CD39A7A-9172-4B85-B8FE-CEB94207A897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81DE32C2-5B07-4812-9F88-000F5FB000C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02EED3D5-8F89-4B7F-A34B-52274B1A754F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F87AA89-F377-4BEB-B69F-809F5DA6176C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C27AF62E-A026-43E9-89E6-CD807CE9DF51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D343B121-C007-49F8-9DE8-AA05CE58FF0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7936B7EE-9CD1-4698-AD67-C619D0171A88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5738D628-0B2D-4F56-9427-2009BFCB6C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F43EBCB4-FCF4-479A-A44D-D913F7F09C77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860F9225-8A3F-492C-B72B-5EFFB322802C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E23724-2CA4-4211-BB83-38661BE7E6AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6143DC1F-D62E-4DB2-AF43-30A07413D68B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"298266AB-2A36-4606-BF80-2185FC56C4D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C2658CA-56C2-494F-AC42-618EC413CBDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD34526D-F2CC-44C5-991D-B1E41C327860\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F0B900-34E9-4545-B7AE-AF0A4363EACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B36F432D-FED1-4B8D-A458-BEDEEF306AB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25379B32-D898-4E44-A740-978A129B5E05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B90F8F2-9549-413D-9676-3EF634D832B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"915E64EF-6EEC-4DE2-A285-5F3FCE389645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585BEE46-088A-494E-8E18-03F33F6BBEA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFF35478-B292-4A00-B985-CEEDE8B212C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E85846A-61BE-4896-B4A6-42A7E1DBA515\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6E3B925-031D-4F6D-915A-A16F0FFA878C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7344B707-6145-48BA-8BC9-9B140A260BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BFCEA98-C708-4E1E-B189-E6F96D28F07A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B753112-CCDE-4870-AA97-4AAA2946421A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79B3AFE7-F4FF-4144-9046-E5926E305A03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7616E197-ACCA-4191-A513-FD48417C7F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE2F94D-E8E0-4BB7-A910-378012580025\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F5AE3B-B701-4579-B44A-0F7A4267852E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34E60197-56C3-485C-9609-B1C4A0E0FCB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E452E4-45A9-4469-BF69-F40B6598F0EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5751AC4-A60F-42C6-88E5-FC8CFEE6F696\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48777A01-8F36-4752-8F7A-1D1686C69A33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42DA6A18-5AA1-4920-94C6-8D0BB73C5352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51F0211-2D3E-4260-AD63-E83AE4EC4AF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C4E1245-C6BB-462C-9E27-C608595DAE3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"747F1324-AEFA-496F-9447-12CD13114F60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"795C3B17-687E-4F33-AA99-8FEC16F14693\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B81A4DD-2ADE-4455-B517-5E4E0532D5A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BD589CC-666B-4FAA-BCF0-91C484BDDB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD622EE-A840-42E1-B6BF-4AA27D039B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"900D6742-DE0F-45C5-A812-BF84088CB02A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225CA94C-8C84-4FA6-95D0-160A0016FBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D88ED3C4-64C5-44B2-9F23-E16087046C40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03FB31E5-190C-489A-AB30-910D2CC854F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF4A781A-4A41-466F-8426-10B40CF8BA1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ED29B3F-456B-4767-8E59-8C19A3B7E1D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6316369-B54A-4E59-A022-E0610353B284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"073C3CE0-E12D-4545-8460-5A1514271D50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB33DEA-13C7-4B36-AB8A-ED680679A071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86DD0FCC-BB12-410D-8C82-AB99C7C5311E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83700989-8820-48DA-A9FE-6A77DF1E8439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC9F4CEC-7781-468B-B460-4F487B7C6601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67C75A62-8807-4821-9362-1E0D63C0A1B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"894D4812-D62F-489E-8D0E-5E9468CE8EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F92E01-4F08-4364-9E87-FFBC095E32E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9960640-F02D-4E81-A34B-1893D8FD7F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9D00DAD-4F2D-45C7-B87C-85118D9DD855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C398D26-7132-4A6E-9003-77246644451B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EED2DA2-2516-42E9-8A33-0FA64BF51DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF425F00-41BA-4F59-A0DE-6362A1E9A142\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33577E79-1B6E-406D-A49B-2CEF1754F5D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B21D90E-5172-485E-87AC-F1681604AD7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C41F6822-92BF-43F5-8B3E-8BAF9E9A320D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"641EECFD-A985-4026-A53A-10FBE47EAD91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47595F81-2083-4236-A0B0-E2B98DD78402\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F5FC758-5A5D-466A-8386-5FC469F79F66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CCA5C83-5293-4107-8E6A-85F82ECF2C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2D0AADC-BC34-40FB-BD69-37981DC8E971\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CA7EAC4-7696-41CE-8EE9-3E39DE226BD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12547B6B-78F1-4426-81CE-5F208794658C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38429E64-276B-46D4-AACD-05349D6F6615\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E89640F8-313B-4A36-A591-36645D1EF838\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE0271F0-41F2-4096-8C91-DAD1A81AF855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A40DCBB-B41B-468E-A918-6EA3F9A125E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"921B6A54-85E3-4867-8EDF-93EB86BAFBD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8A2C6F1-ED7E-4E51-BE72-BD744D554EE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B004CF1-0ACC-441C-9F61-9B20504F4ECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04B42F06-AC6D-40F3-BC03-5126BED48F36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A8002C7-19E2-4F20-890E-4BA2029174D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34FC90C2-AED0-4EAF-B5E8-DE75961DA26E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7DA9C54-742C-4057-8BAB-18755B4A42D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84BBE8BE-EAE8-4F7A-85BD-94BBF64F30EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53037B40-D534-41D1-9895-8EDB0D884C3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5549096F-C640-463E-AD07-FD8D254CC098\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8DCAF19-879C-42BB-B56A-84504E79758A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8ED186-B0FE-4AAC-9B20-DFAD75D7F677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E86E13B-EC92-47F3-94A9-DB515313011D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C6C01B-4CED-4F37-A415-0603496C27DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC47887B-5608-47BE-85EE-563864461915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF39E62B-EAB4-44B0-A421-2A71B7DD8341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"809264F1-763D-4A8F-B206-222332DD8732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A66ED53E-3139-4972-B027-D614BFFB8628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A3AB7A-1959-4A57-B83D-B2753C43649E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A60B265-5508-4EE0-980A-44BB0966FD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06F0037-DE20-4B4A-977F-BFCFAB026517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1817C772-D367-4ABE-B835-466D31A6DC89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C667B8E4-64EB-4A05-84FF-B2243DEF757D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9484B41A-DFB6-4481-80D8-440C711CEA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D373AF-DE6B-428E-9F0F-F1D220900A4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2975DF7-F916-456C-BF7C-2694559E5282\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"784EB96E-2FD3-4F77-8DB6-4D6C7A928946\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"338BB401-8831-4094-9186-2B3CFA5903D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F6269B-5F6B-4413-B14D-7AE5442E4CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189D1246-F975-4411-A58B-343ED90485FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B914F7F-C6BD-4527-B1E9-7FD1E337A18C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"179147E4-5247-451D-9409-545D661BC158\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6554469E-F6AE-4EB0-880E-CBFD196FEE31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C20367B0-F722-4442-8B59-ABB0FEDB8CC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86A98A70-51E3-4556-8DC4-DD09CF370D1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"469EE3B0-3CC2-4AC2-86A0-2DF34205E707\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC547EB-9308-4477-8256-A0E04B42D6DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6940324-0383-4510-BA55-770E0A6B80B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E3313D5-52E8-49B3-B145-170D9A26DA43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D3A5FD5-4C42-4B00-8473-D5650FAED9C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"480F035A-A59D-4113-A246-DF108BB2F591\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30D39E29-B2A0-4075-84AF-994C27AB0A68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19879317-B067-45DA-B497-21EBDDDC2521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D220C745-28AD-4D04-B2D2-A090D229206E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4AF8895-7BF8-458E-B2BB-68699AABC023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA768A9D-6C63-405E-9D14-5D68F8E93A91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF495E58-DA6C-402D-B381-4929CB8A502B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A591301C-C30F-44AC-90F0-709A18AA96E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7D2606B-00A6-4FA3-A00D-B1E8A80B947C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"610A93BB-70E3-4BF1-83E8-8A7388477F44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"821BD11F-3C6A-4424-BC9B-DFD786248B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F55A024-9F8E-44F8-A0D8-696BC232524A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84595143-3B04-4CE8-81C0-28EEEC58CD0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32EE2B49-DDEB-4B49-A5F0-CAA161095A5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3ABFA33-8FA1-488E-A9BD-1593F495F595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62F6DE3A-E6CC-4D7E-BD08-E43DC4182200\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50B422D1-6C6E-4359-A169-3EED78A1CF40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2F19064-CFBF-4B3C-A0A1-CE62265CD592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB759752-DC19-4750-838B-056063EFDC5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96A43C95-8569-40BE-9E5B-F9B3D0B9D188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99662904-E5E3-4E81-B199-39707EAEB652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615BDD1D-36AA-4976-909B-F0F66BF1090C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE8A26D6-1BDA-45F0-8F7C-F95986050E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61A3EDF2-09D7-4116-AE46-D86E4B9602AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F320FA9F-C13D-4AA3-B838-A0E5D63E6A29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B179CF1D-084D-4B21-956F-E55AC6BDE026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F1B4877-286A-44B5-9C5C-0403F75B2BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"432CA976-6EFA-4D34-B5EA-CD772D067F93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E476195-657E-416E-BC16-44A18B06A133\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A55028-B8F9-4AD2-AE57-A80D561F3C79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C4E641C-67D4-4599-8EFB-0B2F8D81D68C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70460F6C-D6C0-4C1A-B13E-368705EAF223\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F26BA18-08AD-45FE-9F83-25CCB2E27270\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EBFF148-3EDA-4216-910B-8930D8C443C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"648C63F7-EA1D-4F2E-B8AF-1F380C83E542\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1697B855-4834-4633-A5C8-C1F7F13ACE0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FBAE75F-9145-4B9A-A6D8-E488C5326145\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFF566DA-0F04-48DA-AA40-565979C55328\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5990C6C2-2F66-4C4D-8224-74163865F410\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A45A9B9-4B19-4A5B-BC95-BCBC4EF00F12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C23AD176-3B99-4593-BCBD-13C1E579A13E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"034DFD7F-8919-4245-8480-7B272F591271\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CEBC606-6488-48CE-8AA8-5B8CC724D5D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A83C60AF-50A9-480E-860D-45E80AC0A6B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22_rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44FDF616-E410-4540-B377-98D1FB88CE35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22_rc7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5313B736-9904-442A-84D6-8FC7B9AC2059\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E249774-CE05-43D5-A5A3-7CCE24BB2AD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D42BA44-C69B-4170-9867-CABF93CA9BD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5140380C-71BD-464F-AE53-1814C2653056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B18EC0A7-8616-4039-B98B-E1216E035B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22FB141B-FA2A-435D-8937-83FC0669CB20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C59131C8-F66A-4380-9F6E-3FC14C7C8562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5421616-4BF5-4269-8996-C3D2BA6AE2A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23FC6CE2-8717-4558-A309-A441D322F00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"311BE336-7BB2-47C0-AED5-3DEA706C206F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE87D1BC-A72D-42D2-A93C-67A5823BEB14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AAC2E9D-0E82-4866-9046-ADD448418198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"760FB32D-9795-4B29-B79A-A32B5E70F7EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DFF67E9-B0C2-48D5-BB3A-CF21D10010FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5881A78C-D162-4DE5-8353-2BB1EC1F428B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B13D81D2-1A89-4E61-A90C-5E8BB880310B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67F2047A-5F17-4B59-9075-41A5DC5C1CD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F9887E-2466-4C73-A8E1-2117492F9EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FDE5B27-2EF0-464E-8F14-5E809D84D389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"815B2EE8-136F-44E4-997D-5F93A54775DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13673DF5-09B1-40C8-AC54-A447DE8AB01E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"085259B8-9D41-42B0-B32B-66B8D365F106\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A12DE15-E192-4B90-ADB7-A886B3746DD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF6588E7-F4FA-40F5-8945-FC7B6094376E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE87E13E-ACF7-4F74-8938-729F3B0D694C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4965A12-1BBA-4494-A5C1-43E0C0F48C14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52152F5A-1833-4490-A373-9C547B90B0F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B64A095E-5E97-445E-B435-F09983CC0E7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8035F93-9DEE-4B92-ABAA-4ABE0B71BF41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EE92406-DBF3-463E-8A51-F9679E851FDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C60D19B-ED9B-443C-9D49-002ABD381119\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"264C61EE-64F6-43AD-B54F-7D683C29E64F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0149408A-30F6-4EDF-8B3B-CBAB884CE758\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71295664-89EC-4BB3-9F86-B1DDA20FAC5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"6ED1BAE4-A6D3-49A1-BCAD-1E514D42F609\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37BE853A-BA6F-4A70-B166-E34441F0B7DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"4F7C4DFF-616C-497D-9BAB-67C2E21BC21D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85064FDF-4B62-43BF-B36C-F659D739BC22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"E6EBBFE8-2332-45CE-93F8-6815C2AE5D17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEADC505-FF44-4D45-8EA6-B23A1C4564D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"388414A1-C9B4-41BA-AD35-6501A463A095\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CE3C807-5C9B-4B71-868B-DF17ECB1514F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"FDBA01DD-C129-48F1-800B-838418F4A4A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6CADAA2-91D2-40C4-90F3-D7F40A3D4CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"185F1EF8-04EB-43ED-B909-8BDF60F23E76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45B6847C-873B-4BE1-852D-239115E59BA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"D9D4BCAD-B3CD-4FA1-A833-0D7D40289E07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF41209E-D27F-4642-A405-90E822A41897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"3483FAFA-353C-498F-AF68-8F5B84A0F30D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97F59FD9-46E5-4F63-80A0-091AD44D1867\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"B3D5AEA5-210B-4E9F-8D9C-C25B84F15C75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"428844A5-E020-4AE9-8012-9AEDFCB7C32E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"6B11A9E1-9D90-46DC-81B5-17A137205AB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94C9D70D-A552-48D6-9497-EE07EB5649D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"07EEC559-9240-46BE-9057-0F17D1F61F99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF6169FF-9FF9-4A81-BAEB-6D5132F64F61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"BBBC127F-D67E-43FE-BCFE-606C200084F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6DC79CF-A504-4232-9F66-B5DCD0213DA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"42B18945-EE09-4E6B-8C11-E382E5F8F850\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"192B4273-0935-4232-BBFD-A850855CAC5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60E9FDA8-7EC3-4B9B-B508-27F948D60DDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4E4A6E5-0C2C-42FD-B982-684CCB0DDFBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A16F2182-C489-4CA9-A56B-01463148D16F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"630A56D3-7A82-44DE-8888-2EB8CD1C24A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E0D6431-E8E0-4079-A1A0-9CE6D1D67709\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF4EF7A7-6E96-43B4-8287-368098ABBFA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEF91995-A084-422A-A544-30B0B4D75E22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E45F4429-5A9C-4E8B-96EE-CCF19776CABF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"12D0C03A-7D30-485F-8431-638918FE9658\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EFCAF09-BB20-424C-8648-014C0F71F8A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A74970C-5EEA-47A7-A62D-AF98F4D1228F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEA56669-B09E-42C2-9591-245C46909A2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9B33D60-8023-4A0B-ACF7-9F811EEB8BCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D08D180-23F7-456F-98CA-26B53C678D76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E3C363-49C9-4869-83B5-76C14100BFF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E1DE903-EDFC-4E0F-8EDF-7762FE3C7C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC02BA18-9235-45CA-A3D6-0EB21CE69DEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"856FE78A-29B5-4411-98A0-4B0281C17EB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B59FCD-8161-48EF-844D-8FA1AB2FAA76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DA311B8-D32E-4853-9B07-58EAF1019D0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0F0F679-43C8-426E-A97E-C3B207A3331C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAE6A7F3-3D04-4119-874D-DA2FA86B7BE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA40BC48-D6B5-4424-B306-F99E85EBBCB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C2DF2BB-F94A-4692-AFDC-47C42F04081B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB286B42-E739-46CD-BC96-972CFFAECB0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"7636014B-CC2A-43A3-9C9A-04B26AEB06D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc9:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4ED7CE5-3388-4CB9-AF60-A2AF19611327\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"324B5A3E-FA65-4F02-9B8F-872F38CD1808\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C75A8FC4-58D2-4B6A-9D8E-FF12DF52E249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE21E2AE-9E01-471C-A419-6AB40A49C2F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADFC2D46-65D0-426F-9AF8-8C910AE91D49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11795F8E-7ACD-4597-9194-FC7241DCE057\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60F381E1-F3C5-49BE-B094-4D90E7B108F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D82A6217-CFA6-4E72-8BED-0297E13EABF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CEA1AF2-2DE7-4B38-987D-15FFA70F06B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7954A701-1671-4080-B1E6-47E0208FD28C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63D06512-EAF0-48C6-98F0-066E63FF07EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F35DA6B-C6D4-47CC-97E7-9659DCFDD162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D75B48F1-623A-4B96-9E08-4AA2DE748490\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26BD805F-08EB-42EC-BC54-26A7278E5089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3463B83B-E46F-456E-98BA-801C59AEB337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8A1A8F2-F892-4EDC-A5DA-1BBD6993E84E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"60EFBFAD-1AF4-49AC-A0E6-A88AB84CD919\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"05FD0767-03F3-416C-AB6D-6BC4A12220B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"8452D554-8DEB-4265-839C-6B40CCFB56B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"94F445F9-57A5-4453-BB5D-290349C04A80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"62C97D20-4152-47C4-B21B-8206CF49E20A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"217715A5-E69D-45C0-B8E4-5681528C651B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A87AD66C-4321-4459-8556-3B0BA38C493A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87A347E0-9C0B-4674-9363-3C36DA27AC45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E0F3DF0-6BD0-4560-9A13-C6493939D8B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4BE1DF7-99CB-416B-B6F9-EC40FBD7D1C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B93AF773-FBB4-4A4A-ADD5-ADA40C24CD36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38A55F08-88A9-42D5-A2B1-8B8C0D6DED09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3975EC77-D33D-4167-91BE-08237C3EE9D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A0F2534-C267-43D9-8365-C00CD979B052\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C386B13F-9D7C-45F8-B86A-886384144A8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:git1:*:*:*:*:*:*\",\"matchCriteriaId\":\"32F95AB2-319C-4BDE-8D34-9FBE69A2FB6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D48FD9D7-E775-4E26-AEBF-01A09C404D6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"89EA3CF3-0AB7-4648-96BA-25E978D2C8C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc2_git7:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E4DB179-F78F-4D36-A47D-557FB1B945DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc8-kk:*:*:*:*:*:*\",\"matchCriteriaId\":\"23859759-4748-4A03-9D78-083C77CFF4AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A701E87D-B807-426E-9CD4-6721DBCABE19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBFA0277-B491-4BB1-88DC-85362F0A689C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10E55450-F6D9-483C-9CC8-E651E5A12AB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"45273823-29EA-44DE-8444-3933402C5793\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F60E74-09DB-4D4A-B922-4A46EED0EC20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E242D3DE-D1DC-406A-BCC3-C4380B7EC369\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"8598D6E5-0C5C-4A31-841A-C12801DB7D91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"59800B0A-477B-42F8-A58A-5144F455AE01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc7-git6:*:*:*:*:*:*\",\"matchCriteriaId\":\"F166BF6B-BFB0-4206-BD59-179701572F1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"29C4A364-ED36-4AC8-AD1E-8BD18DD9324D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4049867A-E3B2-4DC1-8966-0477E6A5D582\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d953126a28f97ec965d23c69fd5795854c048f30\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2010/000082.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/37909\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/38794\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/38834\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/40218\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2010/dsa-2005\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.31/ChangeLog-2.6.31-rc4\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:329\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:051\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/11/05/1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/11/05/4\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1670.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0474.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/36936\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.spinics.net/linux/lists/linux-nfs/msg03357.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-864-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0528\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=529227\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6636\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9734\",\"source\":\"secalert@redhat.com\"}]}}" } }
rhsa-2010_0474
Vulnerability from csaf_redhat
Published
2010-06-15 23:50
Modified
2024-11-22 03:30
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix three security issues and several bugs are
now available for Red Hat Enterprise Linux 4.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security fixes:
* a NULL pointer dereference flaw was found in the Linux kernel NFSv4
implementation. Several of the NFSv4 file locking functions failed to check
whether a file had been opened on the server before performing locking
operations on it. A local, unprivileged user on a system with an NFSv4
share mounted could possibly use this flaw to cause a kernel panic (denial
of service) or escalate their privileges. (CVE-2009-3726, Important)
* a flaw was found in the sctp_process_unk_param() function in the Linux
kernel Stream Control Transmission Protocol (SCTP) implementation. A remote
attacker could send a specially-crafted SCTP packet to an SCTP listening
port on a target system, causing a kernel panic (denial of service).
(CVE-2010-1173, Important)
* a race condition between finding a keyring by name and destroying a freed
keyring was found in the Linux kernel key management facility. A local,
unprivileged user could use this flaw to cause a kernel panic (denial of
service) or escalate their privileges. (CVE-2010-1437, Important)
Red Hat would like to thank Simon Vallet for responsibly reporting
CVE-2009-3726; and Jukka Taimisto and Olli Jarva of Codenomicon Ltd, Nokia
Siemens Networks, and Wind River on behalf of their customer, for
responsibly reporting CVE-2010-1173.
Bug fixes:
* RHBA-2007:0791 introduced a regression in the Journaling Block Device
(JBD). Under certain circumstances, removing a large file (such as 300 MB
or more) did not result in inactive memory being freed, leading to the
system having a large amount of inactive memory. Now, the memory is
correctly freed. (BZ#589155)
* the timer_interrupt() routine did not scale lost real ticks to logical
ticks correctly, possibly causing time drift for 64-bit Red Hat Enterprise
Linux 4 KVM (Kernel-based Virtual Machine) guests that were booted with the
"divider=x" kernel parameter set to a value greater than 1. "warning: many
lost ticks" messages may have been logged on the affected guest systems.
(BZ#590551)
* a bug could have prevented NFSv3 clients from having the most up-to-date
file attributes for files on a given NFSv3 file system. In cases where a
file type changed, such as if a file was removed and replaced with a
directory of the same name, the NFSv3 client may not have noticed this
change until stat(2) was called (for example, by running "ls -l").
(BZ#596372)
* RHBA-2007:0791 introduced bugs in the Linux kernel PCI-X subsystem. These
could have caused a system deadlock on some systems where the BIOS set the
default Maximum Memory Read Byte Count (MMRBC) to 4096, and that also use
the Intel PRO/1000 Linux driver, e1000. Errors such as "e1000: eth[x]:
e1000_clean_tx_irq: Detected Tx Unit Hang" were logged. (BZ#596374)
* an out of memory condition in a KVM guest, using the virtio-net network
driver and also under heavy network stress, could have resulted in
that guest being unable to receive network traffic. Users had to manually
remove and re-add the virtio_net module and restart the network service
before networking worked as expected. Such memory conditions no longer
prevent KVM guests receiving network traffic. (BZ#597310)
* when an SFQ qdisc that limited the queue size to two packets was added to
a network interface, sending traffic through that interface resulted in a
kernel crash. Such a qdisc no longer results in a kernel crash. (BZ#597312)
* when an NFS client opened a file with the O_TRUNC flag set, it received
a valid stateid, but did not use that stateid to perform the SETATTR call.
Such cases were rejected by Red Hat Enterprise Linux 4 NFS servers with an
"NFS4ERR_BAD_STATEID" error, possibly preventing some NFS clients from
writing files to an NFS file system. (BZ#597314)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix three security issues and several bugs are\nnow available for Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* a NULL pointer dereference flaw was found in the Linux kernel NFSv4\nimplementation. Several of the NFSv4 file locking functions failed to check\nwhether a file had been opened on the server before performing locking\noperations on it. A local, unprivileged user on a system with an NFSv4\nshare mounted could possibly use this flaw to cause a kernel panic (denial\nof service) or escalate their privileges. (CVE-2009-3726, Important)\n\n* a flaw was found in the sctp_process_unk_param() function in the Linux\nkernel Stream Control Transmission Protocol (SCTP) implementation. A remote\nattacker could send a specially-crafted SCTP packet to an SCTP listening\nport on a target system, causing a kernel panic (denial of service).\n(CVE-2010-1173, Important)\n\n* a race condition between finding a keyring by name and destroying a freed\nkeyring was found in the Linux kernel key management facility. A local,\nunprivileged user could use this flaw to cause a kernel panic (denial of\nservice) or escalate their privileges. (CVE-2010-1437, Important)\n\nRed Hat would like to thank Simon Vallet for responsibly reporting\nCVE-2009-3726; and Jukka Taimisto and Olli Jarva of Codenomicon Ltd, Nokia\nSiemens Networks, and Wind River on behalf of their customer, for\nresponsibly reporting CVE-2010-1173.\n\nBug fixes:\n\n* RHBA-2007:0791 introduced a regression in the Journaling Block Device\n(JBD). Under certain circumstances, removing a large file (such as 300 MB\nor more) did not result in inactive memory being freed, leading to the\nsystem having a large amount of inactive memory. Now, the memory is\ncorrectly freed. (BZ#589155)\n\n* the timer_interrupt() routine did not scale lost real ticks to logical\nticks correctly, possibly causing time drift for 64-bit Red Hat Enterprise\nLinux 4 KVM (Kernel-based Virtual Machine) guests that were booted with the\n\"divider=x\" kernel parameter set to a value greater than 1. \"warning: many\nlost ticks\" messages may have been logged on the affected guest systems.\n(BZ#590551)\n\n* a bug could have prevented NFSv3 clients from having the most up-to-date\nfile attributes for files on a given NFSv3 file system. In cases where a\nfile type changed, such as if a file was removed and replaced with a\ndirectory of the same name, the NFSv3 client may not have noticed this\nchange until stat(2) was called (for example, by running \"ls -l\").\n(BZ#596372)\n\n* RHBA-2007:0791 introduced bugs in the Linux kernel PCI-X subsystem. These\ncould have caused a system deadlock on some systems where the BIOS set the\ndefault Maximum Memory Read Byte Count (MMRBC) to 4096, and that also use\nthe Intel PRO/1000 Linux driver, e1000. Errors such as \"e1000: eth[x]:\ne1000_clean_tx_irq: Detected Tx Unit Hang\" were logged. (BZ#596374)\n\n* an out of memory condition in a KVM guest, using the virtio-net network\ndriver and also under heavy network stress, could have resulted in\nthat guest being unable to receive network traffic. Users had to manually\nremove and re-add the virtio_net module and restart the network service\nbefore networking worked as expected. Such memory conditions no longer\nprevent KVM guests receiving network traffic. (BZ#597310)\n\n* when an SFQ qdisc that limited the queue size to two packets was added to\na network interface, sending traffic through that interface resulted in a\nkernel crash. Such a qdisc no longer results in a kernel crash. (BZ#597312)\n\n* when an NFS client opened a file with the O_TRUNC flag set, it received\na valid stateid, but did not use that stateid to perform the SETATTR call.\nSuch cases were rejected by Red Hat Enterprise Linux 4 NFS servers with an\n\"NFS4ERR_BAD_STATEID\" error, possibly preventing some NFS clients from\nwriting files to an NFS file system. (BZ#597314)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0474", "url": "https://access.redhat.com/errata/RHSA-2010:0474" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://kbase.redhat.com/faq/docs/DOC-31052", "url": "http://kbase.redhat.com/faq/docs/DOC-31052" }, { "category": "external", "summary": "529227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529227" }, { "category": "external", "summary": "584645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=584645" }, { "category": "external", "summary": "585094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=585094" }, { "category": "external", "summary": "589155", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=589155" }, { "category": "external", "summary": "590551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=590551" }, { "category": "external", "summary": "596372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=596372" }, { "category": "external", "summary": "596374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=596374" }, { "category": "external", "summary": "597310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=597310" }, { "category": "external", "summary": "597312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=597312" }, { "category": "external", "summary": "597314", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=597314" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0474.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T03:30:43+00:00", "generator": { "date": "2024-11-22T03:30:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0474", "initial_release_date": "2010-06-15T23:50:00+00:00", "revision_history": [ { "date": "2010-06-15T23:50:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-06-15T19:53:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:30:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-89.0.26.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-89.0.26.EL.noarch", "product_id": "kernel-doc-0:2.6.9-89.0.26.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.0.26.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.0.26.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-89.0.26.EL.i686", "product": { "name": "kernel-xenU-0:2.6.9-89.0.26.EL.i686", "product_id": "kernel-xenU-0:2.6.9-89.0.26.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.26.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-89.0.26.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-89.0.26.EL.i686", "product_id": "kernel-smp-0:2.6.9-89.0.26.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.26.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.26.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.i686", "product_id": "kernel-devel-0:2.6.9-89.0.26.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.26.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.26.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.0.26.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "product": { "name": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "product_id": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.26.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.26.EL.i686", "product": { "name": "kernel-0:2.6.9-89.0.26.EL.i686", "product_id": "kernel-0:2.6.9-89.0.26.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.26.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.26.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.26.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.26.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.ia64", "product_id": "kernel-devel-0:2.6.9-89.0.26.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.26.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.26.EL.ia64", "product": { "name": "kernel-0:2.6.9-89.0.26.EL.ia64", "product_id": "kernel-0:2.6.9-89.0.26.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.26.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "product_id": "kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.26.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.26.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.26.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "product": { "name": "kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "product_id": "kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.26.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.26.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.26.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.26.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "product": { "name": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "product_id": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.26.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.26.EL.x86_64", "product": { "name": "kernel-0:2.6.9-89.0.26.EL.x86_64", "product_id": "kernel-0:2.6.9-89.0.26.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.26.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "product_id": "kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.26.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.26.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.0.26.EL.src", "product": { "name": "kernel-0:2.6.9-89.0.26.EL.src", "product_id": "kernel-0:2.6.9-89.0.26.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.26.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.26.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.26.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.26.EL.ppc64", "product": { "name": "kernel-0:2.6.9-89.0.26.EL.ppc64", "product_id": "kernel-0:2.6.9-89.0.26.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.26.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "product_id": "kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.26.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.26.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.26.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.26.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.26.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.26.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.s390x", "product_id": "kernel-devel-0:2.6.9-89.0.26.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.26.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.26.EL.s390x", "product": { "name": "kernel-0:2.6.9-89.0.26.EL.s390x", "product_id": "kernel-0:2.6.9-89.0.26.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.26.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.26.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.26.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.s390", "product_id": "kernel-devel-0:2.6.9-89.0.26.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.26.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.26.EL.s390", "product": { "name": "kernel-0:2.6.9-89.0.26.EL.s390", "product_id": "kernel-0:2.6.9-89.0.26.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.26.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.26.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.26.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.26.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.26.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.26.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.26.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.26.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.26.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.26.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.26.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-89.0.26.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.26.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.26.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.26.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.26.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.26.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.26.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.26.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.26.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.26.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-89.0.26.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.26.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.26.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.26.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.26.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.26.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.26.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.26.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.26.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.26.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.26.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.26.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-89.0.26.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.26.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.26.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.26.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.26.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.26.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.26.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.26.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.26.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.26.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.26.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.26.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-89.0.26.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.26.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.26.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Simon Vallet" ] } ], "cve": "CVE-2009-3726", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2009-11-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "529227" } ], "notes": [ { "category": "description", "text": "The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfsv4: kernel panic in nfs4_proc_lock()", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3 did not have support for NFSv4, and therefore is not affected by this issue. It was addressed in Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2010-0474.html, https://rhn.redhat.com/errata/RHSA-2009-1670.html and https://rhn.redhat.com/errata/RHSA-2009-1635.html respectively.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-0:2.6.9-89.0.26.EL.src", "4AS:kernel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.26.EL.src", "4Desktop:kernel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-0:2.6.9-89.0.26.EL.src", "4ES:kernel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-0:2.6.9-89.0.26.EL.src", "4WS:kernel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3726" }, { "category": "external", "summary": "RHBZ#529227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3726", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3726" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3726", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3726" } ], "release_date": "2008-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-06-15T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-0:2.6.9-89.0.26.EL.src", "4AS:kernel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.26.EL.src", "4Desktop:kernel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-0:2.6.9-89.0.26.EL.src", "4ES:kernel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-0:2.6.9-89.0.26.EL.src", "4WS:kernel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0474" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-0:2.6.9-89.0.26.EL.src", "4AS:kernel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.26.EL.src", "4Desktop:kernel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-0:2.6.9-89.0.26.EL.src", "4ES:kernel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-0:2.6.9-89.0.26.EL.src", "4WS:kernel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: nfsv4: kernel panic in nfs4_proc_lock()" }, { "acknowledgments": [ { "names": [ "Wind River", "Nokia Siemens Networks" ] }, { "names": [ "Olli Jarva", "Jukka Taimisto" ], "organization": "Codenomicon Ltd" } ], "cve": "CVE-2010-1173", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "584645" } ], "notes": [ { "category": "description", "text": "The sctp_process_unk_param function in net/sctp/sm_make_chunk.c in the Linux kernel 2.6.33.3 and earlier, when SCTP is enabled, allows remote attackers to cause a denial of service (system crash) via an SCTPChunkInit packet containing multiple invalid parameters that require a large amount of error data.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sctp: crash due to malformed SCTPChunkInit packet", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/CVE-2010-1173.\n\nThis issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3 as it did not include support for SCTP. Future kernel updates in Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG may address this flaw.\n\nFor more information, please see http://kbase.redhat.com/faq/docs/DOC-31052.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-0:2.6.9-89.0.26.EL.src", "4AS:kernel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.26.EL.src", "4Desktop:kernel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-0:2.6.9-89.0.26.EL.src", "4ES:kernel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-0:2.6.9-89.0.26.EL.src", "4WS:kernel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1173" }, { "category": "external", "summary": "RHBZ#584645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=584645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1173", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1173" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1173", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1173" } ], "release_date": "2010-04-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-06-15T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-0:2.6.9-89.0.26.EL.src", "4AS:kernel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.26.EL.src", "4Desktop:kernel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-0:2.6.9-89.0.26.EL.src", "4ES:kernel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-0:2.6.9-89.0.26.EL.src", "4WS:kernel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0474" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-0:2.6.9-89.0.26.EL.src", "4AS:kernel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.26.EL.src", "4Desktop:kernel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-0:2.6.9-89.0.26.EL.src", "4ES:kernel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-0:2.6.9-89.0.26.EL.src", "4WS:kernel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: sctp: crash due to malformed SCTPChunkInit packet" }, { "cve": "CVE-2010-1437", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "585094" } ], "notes": [ { "category": "description", "text": "Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: keyrings: find_keyring_by_name() can gain the freed keyring", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 3. Future kernel updates in Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-0:2.6.9-89.0.26.EL.src", "4AS:kernel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.26.EL.src", "4Desktop:kernel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-0:2.6.9-89.0.26.EL.src", "4ES:kernel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-0:2.6.9-89.0.26.EL.src", "4WS:kernel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1437" }, { "category": "external", "summary": "RHBZ#585094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=585094" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1437", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1437" } ], "release_date": "2010-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-06-15T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-0:2.6.9-89.0.26.EL.src", "4AS:kernel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.26.EL.src", "4Desktop:kernel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-0:2.6.9-89.0.26.EL.src", "4ES:kernel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-0:2.6.9-89.0.26.EL.src", "4WS:kernel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0474" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-0:2.6.9-89.0.26.EL.src", "4AS:kernel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.26.EL.src", "4Desktop:kernel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-0:2.6.9-89.0.26.EL.src", "4ES:kernel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-0:2.6.9-89.0.26.EL.src", "4WS:kernel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.26.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.26.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.26.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: keyrings: find_keyring_by_name() can gain the freed keyring" } ] }
rhsa-2009_1670
Vulnerability from csaf_redhat
Published
2009-12-15 17:05
Modified
2024-11-22 03:26
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security fixes:
* NULL pointer dereference flaws in the r128 driver. Checks to test if the
Concurrent Command Engine state was initialized were missing in private
IOCTL functions. An attacker could use these flaws to cause a local denial
of service or escalate their privileges. (CVE-2009-3620, Important)
* a NULL pointer dereference flaw in the NFSv4 implementation. Several
NFSv4 file locking functions failed to check whether a file had been opened
on the server before performing locking operations on it. A local user on a
system with an NFSv4 share mounted could possibly use this flaw to cause a
denial of service or escalate their privileges. (CVE-2009-3726, Important)
* a flaw in tcf_fill_node(). A certain data structure in this function was
not initialized properly before being copied to user-space. This could lead
to an information leak. (CVE-2009-3612, Moderate)
* unix_stream_connect() did not check if a UNIX domain socket was in the
shutdown state. This could lead to a deadlock. A local, unprivileged user
could use this flaw to cause a denial of service. (CVE-2009-3621, Moderate)
Knowledgebase DOC-20536 has steps to mitigate NULL pointer dereference
flaws.
Bug fixes:
* frequently changing a CPU between online and offline caused a kernel
panic on some systems. (BZ#545583)
* for the LSI Logic LSI53C1030 Ultra320 SCSI controller, read commands sent
could receive incorrect data, preventing correct data transfer. (BZ#529308)
* pciehp could not detect PCI Express hot plug slots on some systems.
(BZ#530383)
* soft lockups: inotify race and contention on dcache_lock. (BZ#533822,
BZ#537019)
* priority ordered lists are now used for threads waiting for a given
mutex. (BZ#533858)
* a deadlock in DLM could cause GFS2 file systems to lock up. (BZ#533859)
* use-after-free bug in the audit subsystem crashed certain systems when
running usermod. (BZ#533861)
* on certain hardware configurations, a kernel panic when the Broadcom
iSCSI offload driver (bnx2i.ko and cnic.ko) was loaded. (BZ#537014)
* qla2xxx: Enabled MSI-X, and correctly handle the module parameter to
control it. This improves performance for certain systems. (BZ#537020)
* system crash when reading the cpuaffinity file on a system. (BZ#537346)
* suspend-resume problems on systems with lots of logical CPUs, e.g. BX-EX.
(BZ#539674)
* off-by-one error in the legacy PCI bus check. (BZ#539675)
* TSC was not made available on systems with multi-clustered APICs. This
could cause slow performance for time-sensitive applications. (BZ#539676)
* ACPI: ARB_DISABLE now disabled on platforms that do not need it.
(BZ#539677)
* fix node to core and power-aware scheduling issues, and a kernel panic
during boot on certain AMD Opteron processors. (BZ#539678, BZ#540469,
BZ#539680, BZ#539682)
* APIC timer interrupt issues on some AMD Opteron systems prevented
achieving full power savings. (BZ#539681)
* general OProfile support for some newer Intel processors. (BZ#539683)
* system crash during boot when NUMA is enabled on systems using MC and
kernel-xen. (BZ#539684)
* on some larger systems, performance issues due to a spinlock. (BZ#539685)
* APIC errors when IOMMU is enabled on some AMD Opteron systems.
(BZ#539687)
* on some AMD Opteron systems, repeatedly taking a CPU offline then online
caused a system hang. (BZ#539688)
* I/O page fault errors on some systems. (BZ#539689)
* certain memory configurations could cause the kernel-xen kernel to fail
to boot on some AMD Opteron systems. (BZ#539690)
* NMI watchdog is now disabled for offline CPUs. (BZ#539691)
* duplicate directories in /proc/acpi/processor/ on BX-EX systems.
(BZ#539692)
* links did not come up when using bnx2x with certain Broadcom devices.
(BZ#540381)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* NULL pointer dereference flaws in the r128 driver. Checks to test if the\nConcurrent Command Engine state was initialized were missing in private\nIOCTL functions. An attacker could use these flaws to cause a local denial\nof service or escalate their privileges. (CVE-2009-3620, Important)\n\n* a NULL pointer dereference flaw in the NFSv4 implementation. Several\nNFSv4 file locking functions failed to check whether a file had been opened\non the server before performing locking operations on it. A local user on a\nsystem with an NFSv4 share mounted could possibly use this flaw to cause a\ndenial of service or escalate their privileges. (CVE-2009-3726, Important)\n\n* a flaw in tcf_fill_node(). A certain data structure in this function was\nnot initialized properly before being copied to user-space. This could lead\nto an information leak. (CVE-2009-3612, Moderate)\n\n* unix_stream_connect() did not check if a UNIX domain socket was in the\nshutdown state. This could lead to a deadlock. A local, unprivileged user\ncould use this flaw to cause a denial of service. (CVE-2009-3621, Moderate)\n\nKnowledgebase DOC-20536 has steps to mitigate NULL pointer dereference\nflaws.\n\nBug fixes:\n\n* frequently changing a CPU between online and offline caused a kernel\npanic on some systems. (BZ#545583)\n\n* for the LSI Logic LSI53C1030 Ultra320 SCSI controller, read commands sent\ncould receive incorrect data, preventing correct data transfer. (BZ#529308)\n\n* pciehp could not detect PCI Express hot plug slots on some systems.\n(BZ#530383)\n\n* soft lockups: inotify race and contention on dcache_lock. (BZ#533822,\nBZ#537019)\n\n* priority ordered lists are now used for threads waiting for a given\nmutex. (BZ#533858)\n\n* a deadlock in DLM could cause GFS2 file systems to lock up. (BZ#533859)\n\n* use-after-free bug in the audit subsystem crashed certain systems when\nrunning usermod. (BZ#533861)\n\n* on certain hardware configurations, a kernel panic when the Broadcom\niSCSI offload driver (bnx2i.ko and cnic.ko) was loaded. (BZ#537014)\n\n* qla2xxx: Enabled MSI-X, and correctly handle the module parameter to\ncontrol it. This improves performance for certain systems. (BZ#537020)\n\n* system crash when reading the cpuaffinity file on a system. (BZ#537346)\n\n* suspend-resume problems on systems with lots of logical CPUs, e.g. BX-EX.\n(BZ#539674)\n\n* off-by-one error in the legacy PCI bus check. (BZ#539675)\n\n* TSC was not made available on systems with multi-clustered APICs. This\ncould cause slow performance for time-sensitive applications. (BZ#539676)\n\n* ACPI: ARB_DISABLE now disabled on platforms that do not need it.\n(BZ#539677)\n\n* fix node to core and power-aware scheduling issues, and a kernel panic\nduring boot on certain AMD Opteron processors. (BZ#539678, BZ#540469,\nBZ#539680, BZ#539682)\n\n* APIC timer interrupt issues on some AMD Opteron systems prevented\nachieving full power savings. (BZ#539681)\n\n* general OProfile support for some newer Intel processors. (BZ#539683)\n\n* system crash during boot when NUMA is enabled on systems using MC and\nkernel-xen. (BZ#539684)\n\n* on some larger systems, performance issues due to a spinlock. (BZ#539685)\n\n* APIC errors when IOMMU is enabled on some AMD Opteron systems.\n(BZ#539687)\n\n* on some AMD Opteron systems, repeatedly taking a CPU offline then online\ncaused a system hang. (BZ#539688)\n\n* I/O page fault errors on some systems. (BZ#539689)\n\n* certain memory configurations could cause the kernel-xen kernel to fail\nto boot on some AMD Opteron systems. (BZ#539690)\n\n* NMI watchdog is now disabled for offline CPUs. (BZ#539691)\n\n* duplicate directories in /proc/acpi/processor/ on BX-EX systems.\n(BZ#539692)\n\n* links did not come up when using bnx2x with certain Broadcom devices.\n(BZ#540381)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1670", "url": "https://access.redhat.com/errata/RHSA-2009:1670" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://kbase.redhat.com/faq/docs/DOC-20536", "url": "http://kbase.redhat.com/faq/docs/DOC-20536" }, { "category": "external", "summary": "528868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528868" }, { "category": "external", "summary": "529227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529227" }, { "category": "external", "summary": "529308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529308" }, { "category": "external", "summary": "529597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597" }, { "category": "external", "summary": "529626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626" }, { "category": "external", "summary": "530383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530383" }, { "category": "external", "summary": "533822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533822" }, { "category": "external", "summary": "533858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533858" }, { "category": "external", "summary": "533859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533859" }, { "category": "external", "summary": "533861", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533861" }, { "category": "external", "summary": "537014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537014" }, { "category": "external", "summary": "537019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537019" }, { "category": "external", "summary": "537020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537020" }, { "category": "external", "summary": "537346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537346" }, { "category": "external", "summary": "539675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539675" }, { "category": "external", "summary": "539676", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539676" }, { "category": "external", "summary": "539677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539677" }, { "category": "external", "summary": "539678", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539678" }, { "category": "external", "summary": "539680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539680" }, { "category": "external", "summary": "539681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539681" }, { "category": "external", "summary": "539682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539682" }, { "category": "external", "summary": "539683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539683" }, { "category": "external", "summary": "539684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539684" }, { "category": "external", "summary": "539685", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539685" }, { "category": "external", "summary": "539687", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539687" }, { "category": "external", "summary": "539688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539688" }, { "category": "external", "summary": "539689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539689" }, { "category": "external", "summary": "539690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539690" }, { "category": "external", "summary": "539691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539691" }, { "category": "external", "summary": "540381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540381" }, { "category": "external", "summary": "540469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540469" }, { "category": "external", "summary": "545583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=545583" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1670.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T03:26:42+00:00", "generator": { "date": "2024-11-22T03:26:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1670", "initial_release_date": "2009-12-15T17:05:00+00:00", "revision_history": [ { "date": "2009-12-15T17:05:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-12-15T12:18:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:26:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-164.9.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-164.9.1.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-164.9.1.el5.i686", "product_id": "kernel-xen-0:2.6.18-164.9.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.9.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-164.9.1.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-164.9.1.el5.i686", "product_id": "kernel-devel-0:2.6.18-164.9.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.9.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.9.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-164.9.1.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-164.9.1.el5.i686", "product_id": "kernel-PAE-0:2.6.18-164.9.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-164.9.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.9.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-164.9.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.9.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.9.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-164.9.1.el5.i686", "product": { "name": "kernel-0:2.6.18-164.9.1.el5.i686", "product_id": "kernel-0:2.6.18-164.9.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.9.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.9.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-164.9.1.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-164.9.1.el5.i686", "product_id": "kernel-debug-0:2.6.18-164.9.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.9.1.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.9.1.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-164.9.1.el5.i386", "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.9.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.9.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.9.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.9.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.9.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.9.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-164.9.1.el5.x86_64", "product": { "name": "kernel-0:2.6.18-164.9.1.el5.x86_64", "product_id": "kernel-0:2.6.18-164.9.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.9.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.9.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.9.1.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-164.9.1.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-164.9.1.el5.noarch", "product_id": "kernel-doc-0:2.6.18-164.9.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-164.9.1.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-164.9.1.el5.src", "product": { "name": "kernel-0:2.6.18-164.9.1.el5.src", "product_id": "kernel-0:2.6.18-164.9.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-0:2.6.18-164.9.1.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-164.9.1.el5.ia64", "product_id": "kernel-xen-0:2.6.18-164.9.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.9.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-164.9.1.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-164.9.1.el5.ia64", "product_id": "kernel-devel-0:2.6.18-164.9.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.9.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.9.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.9.1.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-164.9.1.el5.ia64", "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.9.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.9.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.9.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-164.9.1.el5.ia64", "product": { "name": "kernel-0:2.6.18-164.9.1.el5.ia64", "product_id": "kernel-0:2.6.18-164.9.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.9.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.9.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-164.9.1.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-164.9.1.el5.ia64", "product_id": "kernel-debug-0:2.6.18-164.9.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.9.1.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.9.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.9.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-164.9.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.9.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-164.9.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-164.9.1.el5.ppc64", "product": { "name": "kernel-0:2.6.18-164.9.1.el5.ppc64", "product_id": "kernel-0:2.6.18-164.9.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.9.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-164.9.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.9.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.9.1.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc", "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.18-164.9.1.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-164.9.1.el5.s390x", "product_id": "kernel-devel-0:2.6.18-164.9.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.9.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.9.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.9.1.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-164.9.1.el5.s390x", "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-164.9.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.9.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-164.9.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-164.9.1.el5.s390x", "product": { "name": "kernel-0:2.6.18-164.9.1.el5.s390x", "product_id": "kernel-0:2.6.18-164.9.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.9.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-164.9.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.9.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-164.9.1.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-164.9.1.el5.s390x", "product_id": "kernel-debug-0:2.6.18-164.9.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.9.1.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.9.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.src" }, "product_reference": "kernel-0:2.6.18-164.9.1.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-164.9.1.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-164.9.1.el5.noarch", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.9.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.9.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.src" }, "product_reference": "kernel-0:2.6.18-164.9.1.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-164.9.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-164.9.1.el5.noarch", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.9.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-3612", "discovery_date": "2009-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "528868" } ], "notes": [ { "category": "description", "text": "The tcf_fill_node function in net/sched/cls_api.c in the netlink subsystem in the Linux kernel 2.6.x before 2.6.32-rc5, and 2.4.37.6 and earlier, does not initialize a certain tcm__pad2 structure member, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors. NOTE: this issue exists because of an incomplete fix for CVE-2005-4881.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3 due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about the Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-0:2.6.18-164.9.1.el5.src", "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-0:2.6.18-164.9.1.el5.src", "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3612" }, { "category": "external", "summary": "RHBZ#528868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3612", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3612" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3612", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3612" } ], "release_date": "2009-10-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-15T17:05:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-0:2.6.18-164.9.1.el5.src", "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-0:2.6.18-164.9.1.el5.src", "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1670" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-0:2.6.18-164.9.1.el5.src", "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-0:2.6.18-164.9.1.el5.src", "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7" }, { "cve": "CVE-2009-3620", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2009-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "529597" } ], "notes": [ { "category": "description", "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-0:2.6.18-164.9.1.el5.src", "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-0:2.6.18-164.9.1.el5.src", "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3620" }, { "category": "external", "summary": "RHBZ#529597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620" } ], "release_date": "2009-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-15T17:05:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-0:2.6.18-164.9.1.el5.src", "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-0:2.6.18-164.9.1.el5.src", "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1670" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-0:2.6.18-164.9.1.el5.src", "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-0:2.6.18-164.9.1.el5.src", "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised" }, { "cve": "CVE-2009-3621", "discovery_date": "2009-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "529626" } ], "notes": [ { "category": "description", "text": "net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-0:2.6.18-164.9.1.el5.src", "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-0:2.6.18-164.9.1.el5.src", "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3621" }, { "category": "external", "summary": "RHBZ#529626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3621", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3621" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621" } ], "release_date": "2009-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-15T17:05:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-0:2.6.18-164.9.1.el5.src", "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-0:2.6.18-164.9.1.el5.src", "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1670" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-0:2.6.18-164.9.1.el5.src", "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-0:2.6.18-164.9.1.el5.src", "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket" }, { "acknowledgments": [ { "names": [ "Simon Vallet" ] } ], "cve": "CVE-2009-3726", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2009-11-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "529227" } ], "notes": [ { "category": "description", "text": "The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfsv4: kernel panic in nfs4_proc_lock()", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3 did not have support for NFSv4, and therefore is not affected by this issue. It was addressed in Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2010-0474.html, https://rhn.redhat.com/errata/RHSA-2009-1670.html and https://rhn.redhat.com/errata/RHSA-2009-1635.html respectively.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-0:2.6.18-164.9.1.el5.src", "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-0:2.6.18-164.9.1.el5.src", "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3726" }, { "category": "external", "summary": "RHBZ#529227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3726", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3726" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3726", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3726" } ], "release_date": "2008-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-15T17:05:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-0:2.6.18-164.9.1.el5.src", "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-0:2.6.18-164.9.1.el5.src", "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1670" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-0:2.6.18-164.9.1.el5.src", "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-0:2.6.18-164.9.1.el5.src", "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: nfsv4: kernel panic in nfs4_proc_lock()" } ] }
rhsa-2009_1635
Vulnerability from csaf_redhat
Published
2009-12-03 11:27
Modified
2024-11-22 03:26
Summary
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
Notes
Topic
Updated kernel-rt packages that fix security issues, two bugs, and add two
enhancements are now available for Red Hat Enterprise MRG 1.2.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel-rt packages contain the Linux kernel, the core of any Linux
operating system.
These updated packages fix the following security issues:
* a NULL pointer dereference flaw was found in the NFSv4 implementation in
the Linux kernel. Several of the NFSv4 file locking functions failed to
check whether a file had been opened on the server before performing
locking operations on it. A local user on a system with an NFSv4 share
mounted could possibly use this flaw to cause a denial of service or
escalate their privileges. (CVE-2009-3726, Important)
* permission issues were found in the megaraid_sas driver (for SAS based
RAID controllers) in the Linux kernel. The "dbg_lvl" and "poll_mode_io"
files on the sysfs file system ("/sys/") had world-writable permissions.
This could allow local, unprivileged users to change the behavior of the
driver. (CVE-2009-3889, CVE-2009-3939, Moderate)
These updated packages also fix the following bugs:
* a problem existed with the i5000_edac driver under some topologies. In
some cases, this driver failed to export memory devices via sysfs,
preventing the ibm-prtm service from starting. With this update, the memory
devices are accessible, allowing the ibm-prtm service to start, and
therefore perform SMI remediation as expected. (BZ#527421)
* the "/proc/sys/vm/mmap_min_addr" tunable helps prevent unprivileged
users from creating new memory mappings below the minimum address. The
sysctl value for mmap_min_addr could be changed by a process or user that
has an effective user ID (euid) of 0, even if the process or user does not
have the CAP_SYS_RAWIO capability. This update adds a capability check for
the CAP_SYS_RAWIO capability before allowing the mmap_min_addr value to be
changed. (BZ#534019)
As well, these updated packages add the following enhancements:
* the Intel ixgbe driver was updated to upstream version 2.0.16-k2.
(BZ#537505)
* the InfiniBand OFED driver was updated to upstream version 1.4.1.
(BZ#537500)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues and add these enhancements. The system must
be rebooted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel-rt packages that fix security issues, two bugs, and add two\nenhancements are now available for Red Hat Enterprise MRG 1.2.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a NULL pointer dereference flaw was found in the NFSv4 implementation in\nthe Linux kernel. Several of the NFSv4 file locking functions failed to\ncheck whether a file had been opened on the server before performing\nlocking operations on it. A local user on a system with an NFSv4 share\nmounted could possibly use this flaw to cause a denial of service or\nescalate their privileges. (CVE-2009-3726, Important)\n\n* permission issues were found in the megaraid_sas driver (for SAS based\nRAID controllers) in the Linux kernel. The \"dbg_lvl\" and \"poll_mode_io\"\nfiles on the sysfs file system (\"/sys/\") had world-writable permissions.\nThis could allow local, unprivileged users to change the behavior of the\ndriver. (CVE-2009-3889, CVE-2009-3939, Moderate)\n\nThese updated packages also fix the following bugs:\n\n* a problem existed with the i5000_edac driver under some topologies. In\nsome cases, this driver failed to export memory devices via sysfs,\npreventing the ibm-prtm service from starting. With this update, the memory\ndevices are accessible, allowing the ibm-prtm service to start, and\ntherefore perform SMI remediation as expected. (BZ#527421)\n\n* the \"/proc/sys/vm/mmap_min_addr\" tunable helps prevent unprivileged\nusers from creating new memory mappings below the minimum address. The\nsysctl value for mmap_min_addr could be changed by a process or user that\nhas an effective user ID (euid) of 0, even if the process or user does not\nhave the CAP_SYS_RAWIO capability. This update adds a capability check for\nthe CAP_SYS_RAWIO capability before allowing the mmap_min_addr value to be\nchanged. (BZ#534019)\n\nAs well, these updated packages add the following enhancements:\n\n* the Intel ixgbe driver was updated to upstream version 2.0.16-k2.\n(BZ#537505)\n\n* the InfiniBand OFED driver was updated to upstream version 1.4.1.\n(BZ#537500)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues and add these enhancements. The system must\nbe rebooted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1635", "url": "https://access.redhat.com/errata/RHSA-2009:1635" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "526068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526068" }, { "category": "external", "summary": "527421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=527421" }, { "category": "external", "summary": "529227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529227" }, { "category": "external", "summary": "534019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=534019" }, { "category": "external", "summary": "537500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537500" }, { "category": "external", "summary": "537505", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537505" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1635.json" } ], "title": "Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T03:26:07+00:00", "generator": { "date": "2024-11-22T03:26:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1635", "initial_release_date": "2009-12-03T11:27:00+00:00", "revision_history": [ { "date": "2009-12-03T11:27:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-12-03T06:27:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:26:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "MRG Realtime for RHEL 5 Server", "product": { "name": "MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-5" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debug-0:2.6.24.7-139.el5rt.i686", "product": { "name": "kernel-rt-debug-0:2.6.24.7-139.el5rt.i686", "product_id": "kernel-rt-debug-0:2.6.24.7-139.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-139.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.24.7-139.el5rt.i686", "product": { "name": "kernel-rt-devel-0:2.6.24.7-139.el5rt.i686", "product_id": "kernel-rt-devel-0:2.6.24.7-139.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-139.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.24.7-139.el5rt.i686", "product": { "name": "kernel-rt-vanilla-0:2.6.24.7-139.el5rt.i686", "product_id": "kernel-rt-vanilla-0:2.6.24.7-139.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-139.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.24.7-139.el5rt.i686", "product": { "name": "kernel-rt-trace-0:2.6.24.7-139.el5rt.i686", "product_id": "kernel-rt-trace-0:2.6.24.7-139.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-139.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.i686", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.i686", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-139.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.i686", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.i686", "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-139.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.i686", "product_id": "kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-139.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.i686", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.i686", "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-139.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.i686", "product": { "name": "kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.i686", "product_id": "kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-139.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.i686", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.i686", "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-139.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.i686", "product": { "name": "kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.i686", "product_id": "kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-139.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.i686", "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-139.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-139.el5rt.i686", "product": { "name": "kernel-rt-0:2.6.24.7-139.el5rt.i686", "product_id": "kernel-rt-0:2.6.24.7-139.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-139.el5rt?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debug-0:2.6.24.7-139.el5rt.x86_64", "product": { "name": "kernel-rt-debug-0:2.6.24.7-139.el5rt.x86_64", "product_id": "kernel-rt-debug-0:2.6.24.7-139.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-139.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.24.7-139.el5rt.x86_64", "product": { "name": "kernel-rt-devel-0:2.6.24.7-139.el5rt.x86_64", "product_id": "kernel-rt-devel-0:2.6.24.7-139.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-139.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.24.7-139.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-0:2.6.24.7-139.el5rt.x86_64", "product_id": "kernel-rt-vanilla-0:2.6.24.7-139.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-139.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.24.7-139.el5rt.x86_64", "product": { "name": "kernel-rt-trace-0:2.6.24.7-139.el5rt.x86_64", "product_id": "kernel-rt-trace-0:2.6.24.7-139.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-139.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-139.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-139.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-139.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-139.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.x86_64", "product": { "name": "kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.x86_64", "product_id": "kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-139.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.x86_64", "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-139.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.x86_64", "product": { "name": "kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.x86_64", "product_id": "kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-139.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-139.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-139.el5rt.x86_64", "product": { "name": "kernel-rt-0:2.6.24.7-139.el5rt.x86_64", "product_id": "kernel-rt-0:2.6.24.7-139.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-139.el5rt?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:2.6.24.7-139.el5rt.noarch", "product": { "name": "kernel-rt-doc-0:2.6.24.7-139.el5rt.noarch", "product_id": "kernel-rt-doc-0:2.6.24.7-139.el5rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-139.el5rt?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-139.el5rt.src", "product": { "name": "kernel-rt-0:2.6.24.7-139.el5rt.src", "product_id": "kernel-rt-0:2.6.24.7-139.el5rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-139.el5rt?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-139.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.i686" }, "product_reference": "kernel-rt-0:2.6.24.7-139.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-139.el5rt.src as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.src" }, "product_reference": "kernel-rt-0:2.6.24.7-139.el5rt.src", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-139.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.x86_64" }, "product_reference": "kernel-rt-0:2.6.24.7-139.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.24.7-139.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-139.el5rt.i686" }, "product_reference": "kernel-rt-debug-0:2.6.24.7-139.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.24.7-139.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-139.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-0:2.6.24.7-139.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.i686" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.i686" }, "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.24.7-139.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-139.el5rt.i686" }, "product_reference": "kernel-rt-devel-0:2.6.24.7-139.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.24.7-139.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-139.el5rt.x86_64" }, "product_reference": "kernel-rt-devel-0:2.6.24.7-139.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:2.6.24.7-139.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-139.el5rt.noarch" }, "product_reference": "kernel-rt-doc-0:2.6.24.7-139.el5rt.noarch", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.24.7-139.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-139.el5rt.i686" }, "product_reference": "kernel-rt-trace-0:2.6.24.7-139.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.24.7-139.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-139.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-0:2.6.24.7-139.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.i686" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.i686" }, "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.24.7-139.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-139.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-0:2.6.24.7-139.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.24.7-139.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-139.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-0:2.6.24.7-139.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Simon Vallet" ] } ], "cve": "CVE-2009-3726", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2009-11-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "529227" } ], "notes": [ { "category": "description", "text": "The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfsv4: kernel panic in nfs4_proc_lock()", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3 did not have support for NFSv4, and therefore is not affected by this issue. It was addressed in Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2010-0474.html, https://rhn.redhat.com/errata/RHSA-2009-1670.html and https://rhn.redhat.com/errata/RHSA-2009-1635.html respectively.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-139.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3726" }, { "category": "external", "summary": "RHBZ#529227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3726", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3726" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3726", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3726" } ], "release_date": "2008-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-03T11:27:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-139.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1635" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-139.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: nfsv4: kernel panic in nfs4_proc_lock()" }, { "cve": "CVE-2009-3889", "discovery_date": "2009-11-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "526068" } ], "notes": [ { "category": "description", "text": "The dbg_lvl file for the megaraid_sas driver in the Linux kernel before 2.6.27 has world-writable permissions, which allows local users to change the (1) behavior and (2) logging level of the driver by modifying this file.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: megaraid_sas permissions in sysfs", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise Linux 3, as it does not implement the sysfs file system (\"/sys/\"), through which dbg_lvl file is exposed by the megaraid_sas driver.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-139.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3889" }, { "category": "external", "summary": "RHBZ#526068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526068" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3889", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3889" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3889", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3889" } ], "release_date": "2009-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-03T11:27:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-139.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1635" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-139.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: megaraid_sas permissions in sysfs" }, { "cve": "CVE-2009-3939", "discovery_date": "2009-11-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "526068" } ], "notes": [ { "category": "description", "text": "The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: megaraid_sas permissions in sysfs", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise Linux 3, as it does not implement the sysfs file system (\"/sys/\"), through which poll_mode_io file is exposed by the megaraid_sas driver.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-139.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3939" }, { "category": "external", "summary": "RHBZ#526068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526068" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3939", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3939" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3939", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3939" } ], "release_date": "2009-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-03T11:27:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-139.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1635" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-139.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-139.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-139.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: megaraid_sas permissions in sysfs" } ] }
gsd-2009-3726
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2009-3726", "description": "The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state.", "id": "GSD-2009-3726", "references": [ "https://www.suse.com/security/cve/CVE-2009-3726.html", "https://www.debian.org/security/2010/dsa-2005", "https://www.debian.org/security/2010/dsa-2003", "https://access.redhat.com/errata/RHSA-2010:0474", "https://access.redhat.com/errata/RHSA-2009:1670", "https://access.redhat.com/errata/RHSA-2009:1635", "https://linux.oracle.com/cve/CVE-2009-3726.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2009-3726" ], "details": "The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state.", "id": "GSD-2009-3726", "modified": "2023-12-13T01:19:48.820346Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2009-3726", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.vmware.com/pipermail/security-announce/2010/000082.html", "refsource": "MISC", "url": "http://lists.vmware.com/pipermail/security-announce/2010/000082.html" }, { "name": "http://secunia.com/advisories/38794", "refsource": "MISC", "url": "http://secunia.com/advisories/38794" }, { "name": "http://secunia.com/advisories/38834", "refsource": "MISC", "url": "http://secunia.com/advisories/38834" }, { "name": "http://www.vupen.com/english/advisories/2010/0528", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2010/0528" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html" }, { "name": "http://secunia.com/advisories/37909", "refsource": "MISC", "url": "http://secunia.com/advisories/37909" }, { "name": "http://www.debian.org/security/2010/dsa-2005", "refsource": "MISC", "url": "http://www.debian.org/security/2010/dsa-2005" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051" }, { "name": "http://www.ubuntu.com/usn/usn-864-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/usn-864-1" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" }, { "name": "http://secunia.com/advisories/40218", "refsource": "MISC", "url": "http://secunia.com/advisories/40218" }, { "name": "http://www.redhat.com/support/errata/RHSA-2010-0474.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2010-0474.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:329", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:329" }, { "name": "http://www.redhat.com/support/errata/RHSA-2009-1670.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2009-1670.html" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d953126a28f97ec965d23c69fd5795854c048f30", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d953126a28f97ec965d23c69fd5795854c048f30" }, { "name": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.31/ChangeLog-2.6.31-rc4", "refsource": "MISC", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.31/ChangeLog-2.6.31-rc4" }, { "name": "http://www.openwall.com/lists/oss-security/2009/11/05/1", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2009/11/05/1" }, { "name": "http://www.openwall.com/lists/oss-security/2009/11/05/4", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2009/11/05/4" }, { "name": "http://www.securityfocus.com/bid/36936", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/36936" }, { "name": "http://www.spinics.net/linux/lists/linux-nfs/msg03357.html", "refsource": "MISC", "url": "http://www.spinics.net/linux/lists/linux-nfs/msg03357.html" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6636", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6636" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9734", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9734" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=529227", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529227" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc8-kk:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.35.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.34.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.37.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.37.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.35.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.34.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.29:-rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.35.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:rc3:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.6.31", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.37.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.34.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.29:-rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.35.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc2_git7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.37.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22_rc7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.37.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.34.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22_rc1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.37:-rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.35.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:git1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc7-git6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.37.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2009-3726" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20091105 Re: CVE request: kernel: NULL pointer dereference in nfs4_proc_lock()", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2009/11/05/4" }, { "name": "36936", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/36936" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=529227", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529227" }, { "name": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.31/ChangeLog-2.6.31-rc4", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.31/ChangeLog-2.6.31-rc4" }, { "name": "[oss-security] 20091105 CVE request: kernel: NULL pointer dereference in nfs4_proc_lock()", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2009/11/05/1" }, { "name": "[linux-nfs] 20081022 kernel oops in nfs4_proc_lock", "refsource": "MLIST", "tags": [], "url": "http://www.spinics.net/linux/lists/linux-nfs/msg03357.html" }, { "name": "SUSE-SA:2009:056", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html" }, { "name": "SUSE-SA:2009:061", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html" }, { "name": "MDVSA-2009:329", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:329" }, { "name": "RHSA-2009:1670", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2009-1670.html" }, { "name": "SUSE-SA:2009:064", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html" }, { "name": "37909", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/37909" }, { "name": "SUSE-SA:2010:012", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" }, { "name": "USN-864-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-864-1" }, { "name": "DSA-2005", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2010/dsa-2005" }, { "name": "38834", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/38834" }, { "name": "[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates", "refsource": "MLIST", "tags": [], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000082.html" }, { "name": "ADV-2010-0528", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2010/0528" }, { "name": "38794", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/38794" }, { "name": "RHSA-2010:0474", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0474.html" }, { "name": "40218", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/40218" }, { "name": "MDVSA-2011:051", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051" }, { "name": "oval:org.mitre.oval:def:9734", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9734" }, { "name": "oval:org.mitre.oval:def:6636", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6636" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d953126a28f97ec965d23c69fd5795854c048f30", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d953126a28f97ec965d23c69fd5795854c048f30" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T02:20Z", "publishedDate": "2009-11-09T19:30Z" } } }
ghsa-76cp-8jf4-8pv2
Vulnerability from github
Published
2022-05-02 03:48
Modified
2022-05-02 03:48
Details
The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state.
{ "affected": [], "aliases": [ "CVE-2009-3726" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2009-11-09T19:30:00Z", "severity": "HIGH" }, "details": "The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state.", "id": "GHSA-76cp-8jf4-8pv2", "modified": "2022-05-02T03:48:01Z", "published": "2022-05-02T03:48:01Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3726" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2009:1635" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2009:1670" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2010:0474" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2009-3726" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529227" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6636" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9734" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d953126a28f97ec965d23c69fd5795854c048f30" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d953126a28f97ec965d23c69fd5795854c048f30" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" }, { "type": "WEB", "url": "http://lists.vmware.com/pipermail/security-announce/2010/000082.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/37909" }, { "type": "WEB", "url": "http://secunia.com/advisories/38794" }, { "type": "WEB", "url": "http://secunia.com/advisories/38834" }, { "type": "WEB", "url": "http://secunia.com/advisories/40218" }, { "type": "WEB", "url": "http://www.debian.org/security/2010/dsa-2005" }, { "type": "WEB", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.31/ChangeLog-2.6.31-rc4" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:329" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2009/11/05/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2009/11/05/4" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2009-1670.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0474.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/36936" }, { "type": "WEB", "url": "http://www.spinics.net/linux/lists/linux-nfs/msg03357.html" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-864-1" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/0528" } ], "schema_version": "1.4.0", "severity": [] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.