Action not permitted
Modal body text goes here.
cve-2010-1188
Vulnerability from cvelistv5
Published
2010-03-31 17:35
Modified
2024-08-07 01:14
Severity ?
EPSS score ?
Summary
Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:14:06.920Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1023992", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1023992" }, { "name": "RHSA-2010:0380", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0380.html" }, { "name": "oval:org.mitre.oval:def:9878", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9878" }, { "name": "RHSA-2010:0394", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0394.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/css/P8/documents/100090459" }, { "name": "RHSA-2010:0882", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20" }, { "name": "[oss-security] 20100329 CVE request: kernel: ipv6: skb is unexpectedly freed (remote DoS)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/03/29/1" }, { "name": "39652", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39652" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/linus/fb7e2399ec17f1004c0e0ccfd17439f8759ede01" }, { "name": "RHSA-2010:0439", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0439.html" }, { "name": "39016", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/39016" }, { "name": "RHSA-2010:0424", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0424.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-01-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1023992", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1023992" }, { "name": "RHSA-2010:0380", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0380.html" }, { "name": "oval:org.mitre.oval:def:9878", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9878" }, { "name": "RHSA-2010:0394", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0394.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/css/P8/documents/100090459" }, { "name": "RHSA-2010:0882", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20" }, { "name": "[oss-security] 20100329 CVE request: kernel: ipv6: skb is unexpectedly freed (remote DoS)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/03/29/1" }, { "name": "39652", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39652" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/linus/fb7e2399ec17f1004c0e0ccfd17439f8759ede01" }, { "name": "RHSA-2010:0439", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0439.html" }, { "name": "39016", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/39016" }, { "name": "RHSA-2010:0424", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0424.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-1188", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1023992", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1023992" }, { "name": "RHSA-2010:0380", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0380.html" }, { "name": "oval:org.mitre.oval:def:9878", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9878" }, { "name": "RHSA-2010:0394", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0394.html" }, { "name": "http://support.avaya.com/css/P8/documents/100090459", "refsource": "CONFIRM", "url": "http://support.avaya.com/css/P8/documents/100090459" }, { "name": "RHSA-2010:0882", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html" }, { "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20", "refsource": "CONFIRM", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20" }, { "name": "[oss-security] 20100329 CVE request: kernel: ipv6: skb is unexpectedly freed (remote DoS)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/03/29/1" }, { "name": "39652", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39652" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "name": "http://git.kernel.org/linus/fb7e2399ec17f1004c0e0ccfd17439f8759ede01", "refsource": "CONFIRM", "url": "http://git.kernel.org/linus/fb7e2399ec17f1004c0e0ccfd17439f8759ede01" }, { "name": "RHSA-2010:0439", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0439.html" }, { "name": "39016", "refsource": "BID", "url": "http://www.securityfocus.com/bid/39016" }, { "name": "RHSA-2010:0424", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0424.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-1188", "datePublished": "2010-03-31T17:35:00", "dateReserved": "2010-03-30T00:00:00", "dateUpdated": "2024-08-07T01:14:06.920Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2010-1188\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2010-03-31T18:00:00.563\",\"lastModified\":\"2017-09-19T01:30:35.550\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de uso despues de liberacion en net/ipv4/tcp_input.c en el kernel Linux 2.6 en versiones anteriores a la 2.6.20, cuando IPV6_RECVPKTINFO est\u00e1 habilitado en un socket a la escucha, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (kernel panic) mediante un paquete SYN mientras el socket est\u00e1 en un estado de escucha (TCP_LISTEN), el cual no es manejado adecuadamente, provoca que la estructura skb sea liberada.\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat is aware of this issue and is tracking it via the following bug:\\nhttps://bugzilla.redhat.com/CVE-2010-1188\\n\\nThis issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise MRG, as it was fixed since version v2.6.20-rc6. It was addressed in Red Hat Enterprise Linux 5 in the kernel package via https://rhn.redhat.com/errata/RHSA-2010-0178.html. A future update in Red Hat Enterprise Linux 3 and 4 may address this flaw.\",\"lastModified\":\"2010-04-09T00:00:00\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":7.1},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142BCD48-8387-4D0C-A052-44DD4144CBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8220D81-9065-471F-9256-CFE7B9941555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB445E3E-CCBD-4737-BE30-841B9A79D558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D90502F-EC45-4ADC-9428-B94346DA660B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CD39A7A-9172-4B85-B8FE-CEB94207A897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81DE32C2-5B07-4812-9F88-000F5FB000C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02EED3D5-8F89-4B7F-A34B-52274B1A754F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F87AA89-F377-4BEB-B69F-809F5DA6176C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C27AF62E-A026-43E9-89E6-CD807CE9DF51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D343B121-C007-49F8-9DE8-AA05CE58FF0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7936B7EE-9CD1-4698-AD67-C619D0171A88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5738D628-0B2D-4F56-9427-2009BFCB6C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F43EBCB4-FCF4-479A-A44D-D913F7F09C77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860F9225-8A3F-492C-B72B-5EFFB322802C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E23724-2CA4-4211-BB83-38661BE7E6AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6143DC1F-D62E-4DB2-AF43-30A07413D68B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"298266AB-2A36-4606-BF80-2185FC56C4D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C2658CA-56C2-494F-AC42-618EC413CBDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD34526D-F2CC-44C5-991D-B1E41C327860\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F0B900-34E9-4545-B7AE-AF0A4363EACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B36F432D-FED1-4B8D-A458-BEDEEF306AB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25379B32-D898-4E44-A740-978A129B5E05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B90F8F2-9549-413D-9676-3EF634D832B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"915E64EF-6EEC-4DE2-A285-5F3FCE389645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585BEE46-088A-494E-8E18-03F33F6BBEA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFF35478-B292-4A00-B985-CEEDE8B212C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E85846A-61BE-4896-B4A6-42A7E1DBA515\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6E3B925-031D-4F6D-915A-A16F0FFA878C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7344B707-6145-48BA-8BC9-9B140A260BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BFCEA98-C708-4E1E-B189-E6F96D28F07A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B753112-CCDE-4870-AA97-4AAA2946421A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79B3AFE7-F4FF-4144-9046-E5926E305A03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7616E197-ACCA-4191-A513-FD48417C7F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE2F94D-E8E0-4BB7-A910-378012580025\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F5AE3B-B701-4579-B44A-0F7A4267852E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34E60197-56C3-485C-9609-B1C4A0E0FCB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E452E4-45A9-4469-BF69-F40B6598F0EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5751AC4-A60F-42C6-88E5-FC8CFEE6F696\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48777A01-8F36-4752-8F7A-1D1686C69A33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42DA6A18-5AA1-4920-94C6-8D0BB73C5352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51F0211-2D3E-4260-AD63-E83AE4EC4AF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C4E1245-C6BB-462C-9E27-C608595DAE3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"747F1324-AEFA-496F-9447-12CD13114F60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"795C3B17-687E-4F33-AA99-8FEC16F14693\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B81A4DD-2ADE-4455-B517-5E4E0532D5A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BD589CC-666B-4FAA-BCF0-91C484BDDB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD622EE-A840-42E1-B6BF-4AA27D039B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"900D6742-DE0F-45C5-A812-BF84088CB02A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225CA94C-8C84-4FA6-95D0-160A0016FBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D88ED3C4-64C5-44B2-9F23-E16087046C40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03FB31E5-190C-489A-AB30-910D2CC854F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF4A781A-4A41-466F-8426-10B40CF8BA1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ED29B3F-456B-4767-8E59-8C19A3B7E1D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6316369-B54A-4E59-A022-E0610353B284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"073C3CE0-E12D-4545-8460-5A1514271D50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB33DEA-13C7-4B36-AB8A-ED680679A071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86DD0FCC-BB12-410D-8C82-AB99C7C5311E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83700989-8820-48DA-A9FE-6A77DF1E8439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC9F4CEC-7781-468B-B460-4F487B7C6601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67C75A62-8807-4821-9362-1E0D63C0A1B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"894D4812-D62F-489E-8D0E-5E9468CE8EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F92E01-4F08-4364-9E87-FFBC095E32E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9960640-F02D-4E81-A34B-1893D8FD7F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9D00DAD-4F2D-45C7-B87C-85118D9DD855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C398D26-7132-4A6E-9003-77246644451B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EED2DA2-2516-42E9-8A33-0FA64BF51DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF425F00-41BA-4F59-A0DE-6362A1E9A142\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33577E79-1B6E-406D-A49B-2CEF1754F5D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B21D90E-5172-485E-87AC-F1681604AD7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C41F6822-92BF-43F5-8B3E-8BAF9E9A320D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"641EECFD-A985-4026-A53A-10FBE47EAD91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47595F81-2083-4236-A0B0-E2B98DD78402\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F5FC758-5A5D-466A-8386-5FC469F79F66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CCA5C83-5293-4107-8E6A-85F82ECF2C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2D0AADC-BC34-40FB-BD69-37981DC8E971\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CA7EAC4-7696-41CE-8EE9-3E39DE226BD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12547B6B-78F1-4426-81CE-5F208794658C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38429E64-276B-46D4-AACD-05349D6F6615\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E89640F8-313B-4A36-A591-36645D1EF838\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE0271F0-41F2-4096-8C91-DAD1A81AF855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A40DCBB-B41B-468E-A918-6EA3F9A125E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"921B6A54-85E3-4867-8EDF-93EB86BAFBD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8A2C6F1-ED7E-4E51-BE72-BD744D554EE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B004CF1-0ACC-441C-9F61-9B20504F4ECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04B42F06-AC6D-40F3-BC03-5126BED48F36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A8002C7-19E2-4F20-890E-4BA2029174D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34FC90C2-AED0-4EAF-B5E8-DE75961DA26E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7DA9C54-742C-4057-8BAB-18755B4A42D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84BBE8BE-EAE8-4F7A-85BD-94BBF64F30EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53037B40-D534-41D1-9895-8EDB0D884C3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5549096F-C640-463E-AD07-FD8D254CC098\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8DCAF19-879C-42BB-B56A-84504E79758A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8ED186-B0FE-4AAC-9B20-DFAD75D7F677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E86E13B-EC92-47F3-94A9-DB515313011D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"980A6C7D-6175-4A44-8377-74AA7A9FD108\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C226902-04D9-4F32-866C-20225841ECF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"655DB612-AF49-4C17-AFB9-2E33EE8E0572\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE30F34-EE81-4E1E-BF9F-A7A36B78B897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1F65DF2-2794-47B7-9676-CCF150683CC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C6C01B-4CED-4F37-A415-0603496C27DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC47887B-5608-47BE-85EE-563864461915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF39E62B-EAB4-44B0-A421-2A71B7DD8341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"809264F1-763D-4A8F-B206-222332DD8732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A66ED53E-3139-4972-B027-D614BFFB8628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A3AB7A-1959-4A57-B83D-B2753C43649E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A60B265-5508-4EE0-980A-44BB0966FD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06F0037-DE20-4B4A-977F-BFCFAB026517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1817C772-D367-4ABE-B835-466D31A6DC89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C667B8E4-64EB-4A05-84FF-B2243DEF757D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9484B41A-DFB6-4481-80D8-440C711CEA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D373AF-DE6B-428E-9F0F-F1D220900A4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2975DF7-F916-456C-BF7C-2694559E5282\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"784EB96E-2FD3-4F77-8DB6-4D6C7A928946\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"338BB401-8831-4094-9186-2B3CFA5903D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F6269B-5F6B-4413-B14D-7AE5442E4CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189D1246-F975-4411-A58B-343ED90485FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B914F7F-C6BD-4527-B1E9-7FD1E337A18C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"179147E4-5247-451D-9409-545D661BC158\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6554469E-F6AE-4EB0-880E-CBFD196FEE31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C20367B0-F722-4442-8B59-ABB0FEDB8CC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86A98A70-51E3-4556-8DC4-DD09CF370D1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"469EE3B0-3CC2-4AC2-86A0-2DF34205E707\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC547EB-9308-4477-8256-A0E04B42D6DA\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/linus/fb7e2399ec17f1004c0e0ccfd17439f8759ede01\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/39652\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.avaya.com/css/P8/documents/100090459\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/03/29/1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0380.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0394.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0424.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0439.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0882.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/39016\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1023992\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0009.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9878\",\"source\":\"cve@mitre.org\"}]}}" } }
rhsa-2010_0424
Vulnerability from csaf_redhat
Published
2010-05-18 22:03
Modified
2024-11-05 17:16
Summary
Red Hat Security Advisory: kernel security and enhancement update
Notes
Topic
Updated kernel packages that fix one security issue and add one enhancement
are now available for Red Hat Enterprise Linux 4.7 Extended Update Support.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issue:
* a use-after-free flaw was found in the tcp_rcv_state_process() function
in the Linux kernel TCP/IP protocol suite implementation. If a system using
IPv6 had the IPV6_RECVPKTINFO option set on a listening socket, a remote
attacker could send an IPv6 packet to that system, causing a kernel panic
(denial of service). (CVE-2010-1188, Important)
This update also adds the following enhancement:
* kernel support for the iptables connlimit module. This module can be used
to help mitigate some types of denial of service attacks. Note: This update
alone does not address connlimit support. A future iptables package update
will allow connlimit to work correctly. (BZ#563222)
Users should upgrade to these updated packages, which contain backported
patches to correct this issue and add this enhancement. The system must be
rebooted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix one security issue and add one enhancement\nare now available for Red Hat Enterprise Linux 4.7 Extended Update Support.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issue:\n\n* a use-after-free flaw was found in the tcp_rcv_state_process() function\nin the Linux kernel TCP/IP protocol suite implementation. If a system using\nIPv6 had the IPV6_RECVPKTINFO option set on a listening socket, a remote\nattacker could send an IPv6 packet to that system, causing a kernel panic\n(denial of service). (CVE-2010-1188, Important)\n\nThis update also adds the following enhancement:\n\n* kernel support for the iptables connlimit module. This module can be used\nto help mitigate some types of denial of service attacks. Note: This update\nalone does not address connlimit support. A future iptables package update\nwill allow connlimit to work correctly. (BZ#563222)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct this issue and add this enhancement. The system must be\nrebooted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0424", "url": "https://access.redhat.com/errata/RHSA-2010:0424" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "563222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=563222" }, { "category": "external", "summary": "577711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0424.json" } ], "title": "Red Hat Security Advisory: kernel security and enhancement update", "tracking": { "current_release_date": "2024-11-05T17:16:38+00:00", "generator": { "date": "2024-11-05T17:16:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2010:0424", "initial_release_date": "2010-05-18T22:03:00+00:00", "revision_history": [ { "date": "2010-05-18T22:03:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-05-18T18:06:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T17:16:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS EUS (v. 4.7)", "product": { "name": "Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:4.7::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES EUS (v. 4.7)", "product": { "name": "Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:4.7::es" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-xenU-0:2.6.9-78.0.31.EL.i686", "product": { "name": "kernel-xenU-0:2.6.9-78.0.31.EL.i686", "product_id": "kernel-xenU-0:2.6.9-78.0.31.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-78.0.31.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-78.0.31.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-78.0.31.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-78.0.31.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-78.0.31.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-78.0.31.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-78.0.31.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-78.0.31.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-78.0.31.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-78.0.31.EL.i686", "product": { "name": "kernel-0:2.6.9-78.0.31.EL.i686", "product_id": "kernel-0:2.6.9-78.0.31.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.31.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-78.0.31.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.31.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-78.0.31.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-78.0.31.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-78.0.31.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-78.0.31.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-78.0.31.EL.i686", "product": { "name": "kernel-xenU-devel-0:2.6.9-78.0.31.EL.i686", "product_id": "kernel-xenU-devel-0:2.6.9-78.0.31.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-78.0.31.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-78.0.31.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-78.0.31.EL.i686", "product_id": "kernel-smp-0:2.6.9-78.0.31.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-78.0.31.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-78.0.31.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-78.0.31.EL.i686", "product_id": "kernel-devel-0:2.6.9-78.0.31.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.31.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-xenU-0:2.6.9-78.0.31.EL.x86_64", "product": { "name": "kernel-xenU-0:2.6.9-78.0.31.EL.x86_64", "product_id": "kernel-xenU-0:2.6.9-78.0.31.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-78.0.31.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-78.0.31.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-78.0.31.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-78.0.31.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-78.0.31.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-78.0.31.EL.x86_64", "product": { "name": "kernel-largesmp-0:2.6.9-78.0.31.EL.x86_64", "product_id": "kernel-largesmp-0:2.6.9-78.0.31.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.31.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-78.0.31.EL.x86_64", "product": { "name": "kernel-0:2.6.9-78.0.31.EL.x86_64", "product_id": "kernel-0:2.6.9-78.0.31.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.31.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-78.0.31.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.31.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-78.0.31.EL.x86_64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.31.EL.x86_64", "product_id": "kernel-largesmp-devel-0:2.6.9-78.0.31.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.31.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-78.0.31.EL.x86_64", "product": { "name": "kernel-xenU-devel-0:2.6.9-78.0.31.EL.x86_64", "product_id": "kernel-xenU-devel-0:2.6.9-78.0.31.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-78.0.31.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-78.0.31.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-78.0.31.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-78.0.31.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-78.0.31.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-78.0.31.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-78.0.31.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-78.0.31.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.31.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-78.0.31.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-78.0.31.EL.noarch", "product_id": "kernel-doc-0:2.6.9-78.0.31.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-78.0.31.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-78.0.31.EL.ia64", "product": { "name": "kernel-largesmp-0:2.6.9-78.0.31.EL.ia64", "product_id": "kernel-largesmp-0:2.6.9-78.0.31.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.31.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-78.0.31.EL.ia64", "product": { "name": "kernel-0:2.6.9-78.0.31.EL.ia64", "product_id": "kernel-0:2.6.9-78.0.31.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.31.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-78.0.31.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.31.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ia64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ia64", "product_id": "kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.31.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-78.0.31.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-78.0.31.EL.ia64", "product_id": "kernel-devel-0:2.6.9-78.0.31.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.31.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-78.0.31.EL.src", "product": { "name": "kernel-0:2.6.9-78.0.31.EL.src", "product_id": "kernel-0:2.6.9-78.0.31.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.31.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-78.0.31.EL.ppc64", "product": { "name": "kernel-largesmp-0:2.6.9-78.0.31.EL.ppc64", "product_id": "kernel-largesmp-0:2.6.9-78.0.31.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.31.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-78.0.31.EL.ppc64", "product": { "name": "kernel-0:2.6.9-78.0.31.EL.ppc64", "product_id": "kernel-0:2.6.9-78.0.31.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.31.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.31.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ppc64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ppc64", "product_id": "kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.31.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-78.0.31.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-78.0.31.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-78.0.31.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.31.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-78.0.31.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-78.0.31.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-78.0.31.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.31.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.31.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-78.0.31.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-78.0.31.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-78.0.31.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.31.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-78.0.31.EL.s390x", "product": { "name": "kernel-0:2.6.9-78.0.31.EL.s390x", "product_id": "kernel-0:2.6.9-78.0.31.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.31.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-78.0.31.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.31.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-78.0.31.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-78.0.31.EL.s390x", "product_id": "kernel-devel-0:2.6.9-78.0.31.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.31.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-78.0.31.EL.s390", "product": { "name": "kernel-0:2.6.9-78.0.31.EL.s390", "product_id": "kernel-0:2.6.9-78.0.31.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.31.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-78.0.31.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.31.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-78.0.31.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-78.0.31.EL.s390", "product_id": "kernel-devel-0:2.6.9-78.0.31.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.31.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.31.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.i686" }, "product_reference": "kernel-0:2.6.9-78.0.31.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.31.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.ia64" }, "product_reference": "kernel-0:2.6.9-78.0.31.EL.ia64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.31.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-78.0.31.EL.ppc64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.31.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-78.0.31.EL.ppc64iseries", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.31.EL.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.s390" }, "product_reference": "kernel-0:2.6.9-78.0.31.EL.s390", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.31.EL.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.s390x" }, "product_reference": "kernel-0:2.6.9-78.0.31.EL.s390x", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.31.EL.src as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.src" }, "product_reference": "kernel-0:2.6.9-78.0.31.EL.src", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.31.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-78.0.31.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.31.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.31.EL.ia64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64iseries", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.31.EL.s390", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.31.EL.s390x", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.31.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.31.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-78.0.31.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.31.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-78.0.31.EL.ia64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.31.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-78.0.31.EL.ppc64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.31.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-78.0.31.EL.ppc64iseries", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.31.EL.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-78.0.31.EL.s390", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.31.EL.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-78.0.31.EL.s390x", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.31.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-78.0.31.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-78.0.31.EL.noarch as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-doc-0:2.6.9-78.0.31.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-78.0.31.EL.noarch", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-78.0.31.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.31.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-78.0.31.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-78.0.31.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.31.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.31.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-78.0.31.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-78.0.31.EL.ia64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-78.0.31.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-78.0.31.EL.ppc64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-78.0.31.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-78.0.31.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ia64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ppc64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.31.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.31.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-78.0.31.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.31.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-78.0.31.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-78.0.31.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.31.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-78.0.31.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-78.0.31.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.31.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-78.0.31.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-78.0.31.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.31.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-78.0.31.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-78.0.31.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.31.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-78.0.31.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-78.0.31.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.31.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-78.0.31.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-78.0.31.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.31.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.31.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-78.0.31.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.31.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.31.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.31.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.i686" }, "product_reference": "kernel-0:2.6.9-78.0.31.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.31.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.ia64" }, "product_reference": "kernel-0:2.6.9-78.0.31.EL.ia64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.31.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-78.0.31.EL.ppc64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.31.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-78.0.31.EL.ppc64iseries", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.31.EL.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.s390" }, "product_reference": "kernel-0:2.6.9-78.0.31.EL.s390", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.31.EL.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.s390x" }, "product_reference": "kernel-0:2.6.9-78.0.31.EL.s390x", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.31.EL.src as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.src" }, "product_reference": "kernel-0:2.6.9-78.0.31.EL.src", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.31.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-78.0.31.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.31.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.31.EL.ia64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64iseries", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.31.EL.s390", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.31.EL.s390x", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.31.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.31.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.31.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-78.0.31.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.31.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-78.0.31.EL.ia64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.31.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-78.0.31.EL.ppc64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.31.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-78.0.31.EL.ppc64iseries", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.31.EL.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-78.0.31.EL.s390", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.31.EL.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-78.0.31.EL.s390x", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.31.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-78.0.31.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-78.0.31.EL.noarch as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-doc-0:2.6.9-78.0.31.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-78.0.31.EL.noarch", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-78.0.31.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.31.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-78.0.31.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-78.0.31.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.31.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.31.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-78.0.31.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-78.0.31.EL.ia64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-78.0.31.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-78.0.31.EL.ppc64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-78.0.31.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-78.0.31.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ia64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ppc64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.31.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.31.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-78.0.31.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.31.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-78.0.31.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-78.0.31.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.31.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-78.0.31.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-78.0.31.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.31.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-78.0.31.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-78.0.31.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.31.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-78.0.31.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-78.0.31.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.31.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-78.0.31.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-78.0.31.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.31.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-78.0.31.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-78.0.31.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.31.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.31.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-78.0.31.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.31.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.31.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-1188", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "577711" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipv6: skb is unexpectedly freed", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise MRG, as it was fixed since version v2.6.20-rc6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.ia64", "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.ppc64", "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.ppc64iseries", "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.s390", "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.s390x", "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.src", "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ia64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64iseries", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.s390", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.s390x", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ia64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ppc64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ppc64iseries", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.s390", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.s390x", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-doc-0:2.6.9-78.0.31.EL.noarch", "4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.ia64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.ppc64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ia64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ppc64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.ia64", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.ppc64", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.ppc64iseries", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.s390", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.s390x", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.src", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ia64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64iseries", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.s390", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.s390x", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ia64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ppc64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ppc64iseries", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.s390", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.s390x", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-doc-0:2.6.9-78.0.31.EL.noarch", "4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.ia64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.ppc64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ia64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ppc64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.31.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1188" }, { "category": "external", "summary": "RHBZ#577711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1188", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1188" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188" } ], "release_date": "2007-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-05-18T22:03:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.ia64", "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.ppc64", "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.ppc64iseries", "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.s390", "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.s390x", "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.src", "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ia64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64iseries", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.s390", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.s390x", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ia64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ppc64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ppc64iseries", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.s390", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.s390x", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-doc-0:2.6.9-78.0.31.EL.noarch", "4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.ia64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.ppc64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ia64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ppc64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.ia64", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.ppc64", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.ppc64iseries", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.s390", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.s390x", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.src", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ia64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64iseries", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.s390", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.s390x", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ia64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ppc64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ppc64iseries", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.s390", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.s390x", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-doc-0:2.6.9-78.0.31.EL.noarch", "4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.ia64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.ppc64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ia64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ppc64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.31.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0424" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.ia64", "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.ppc64", "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.ppc64iseries", "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.s390", "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.s390x", "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.src", "4AS-4.7.z:kernel-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ia64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64iseries", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.s390", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.s390x", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ia64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ppc64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ppc64iseries", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.s390", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.s390x", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-doc-0:2.6.9-78.0.31.EL.noarch", "4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.ia64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.ppc64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ia64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ppc64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.31.EL.x86_64", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.31.EL.i686", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.ia64", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.ppc64", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.ppc64iseries", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.s390", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.s390x", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.src", "4ES-4.7.z:kernel-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ia64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.ppc64iseries", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.s390", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.s390x", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ia64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ppc64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.ppc64iseries", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.s390", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.s390x", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-doc-0:2.6.9-78.0.31.EL.noarch", "4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.ia64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.ppc64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ia64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.ppc64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.31.EL.x86_64", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.31.EL.i686", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.31.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ipv6: skb is unexpectedly freed" } ] }
rhsa-2010_0439
Vulnerability from csaf_redhat
Published
2010-05-25 15:29
Modified
2024-11-05 17:16
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix one security issue and two bugs are now
available for Red Hat Enterprise Linux 5.3 Extended Update Support.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issue:
* a use-after-free flaw was found in the tcp_rcv_state_process() function
in the Linux kernel TCP/IP protocol suite implementation. If a system using
IPv6 had the IPV6_RECVPKTINFO option set on a listening socket, a remote
attacker could send an IPv6 packet to that system, causing a kernel panic
(denial of service). (CVE-2010-1188, Important)
This update also fixes the following bugs:
* a memory leak occurred when reading files on an NFS file system that was
mounted with the "noac" option, causing memory to slowly be consumed.
Unmounting the file system did not free the memory. With this update, the
memory is correctly freed, which resolves this issue. (BZ#588221)
* the RHSA-2009:0225 update fixed a bug where, in some cases, on systems
with the kdump service enabled, pressing Alt+SysRq+C to trigger a crash
resulted in a system hang; therefore, the system did not restart and boot
the dump-capture kernel as expected; no vmcore file was logged; and the
following message was displayed on the console:
BUG: warning at arch/[arch]/kernel/crash.c:[xxx]/nmi_shootdown_cpus() (Not
tainted)
The RHSA-2009:0225 update resolved this issue by not calling printk()
during a crash. It was later discovered that this fix did not resolve the
issue in all cases, since there was one condition where printk() was
still being called: at a warning condition inside the mdelay() call.
This update replaces mdelay() calls with udelay(), where such a warning
condition does not exist, which fully resolves this issue, allowing
Alt+SysRq+C to work as expected. (BZ#588211)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix one security issue and two bugs are now\navailable for Red Hat Enterprise Linux 5.3 Extended Update Support.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issue:\n\n* a use-after-free flaw was found in the tcp_rcv_state_process() function\nin the Linux kernel TCP/IP protocol suite implementation. If a system using\nIPv6 had the IPV6_RECVPKTINFO option set on a listening socket, a remote\nattacker could send an IPv6 packet to that system, causing a kernel panic\n(denial of service). (CVE-2010-1188, Important)\n\nThis update also fixes the following bugs:\n\n* a memory leak occurred when reading files on an NFS file system that was\nmounted with the \"noac\" option, causing memory to slowly be consumed.\nUnmounting the file system did not free the memory. With this update, the\nmemory is correctly freed, which resolves this issue. (BZ#588221)\n\n* the RHSA-2009:0225 update fixed a bug where, in some cases, on systems\nwith the kdump service enabled, pressing Alt+SysRq+C to trigger a crash\nresulted in a system hang; therefore, the system did not restart and boot\nthe dump-capture kernel as expected; no vmcore file was logged; and the\nfollowing message was displayed on the console:\n\nBUG: warning at arch/[arch]/kernel/crash.c:[xxx]/nmi_shootdown_cpus() (Not\ntainted)\n\nThe RHSA-2009:0225 update resolved this issue by not calling printk()\nduring a crash. It was later discovered that this fix did not resolve the\nissue in all cases, since there was one condition where printk() was\nstill being called: at a warning condition inside the mdelay() call.\n\nThis update replaces mdelay() calls with udelay(), where such a warning\ncondition does not exist, which fully resolves this issue, allowing\nAlt+SysRq+C to work as expected. (BZ#588211)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0439", "url": "https://access.redhat.com/errata/RHSA-2010:0439" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "577711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711" }, { "category": "external", "summary": "588211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=588211" }, { "category": "external", "summary": "588221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=588221" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0439.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-05T17:16:30+00:00", "generator": { "date": "2024-11-05T17:16:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2010:0439", "initial_release_date": "2010-05-25T15:29:00+00:00", "revision_history": [ { "date": "2010-05-25T15:29:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-05-25T11:30:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T17:16:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux EUS (v. 5.3 server)", "product": { "name": "Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:5.3" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.17.1.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-128.17.1.el5.i686", "product_id": "kernel-xen-0:2.6.18-128.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-128.17.1.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-128.17.1.el5.i686", "product_id": "kernel-PAE-0:2.6.18-128.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-128.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.17.1.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-128.17.1.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-128.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.17.1.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-128.17.1.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-128.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.17.1.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-128.17.1.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-128.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.17.1.el5.i686", "product": { "name": "kernel-0:2.6.18-128.17.1.el5.i686", "product_id": "kernel-0:2.6.18-128.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-128.17.1.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-128.17.1.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-128.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-128.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-128.17.1.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-128.17.1.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-128.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-128.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.17.1.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-128.17.1.el5.i686", "product_id": "kernel-debug-0:2.6.18-128.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.17.1.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-128.17.1.el5.i686", "product_id": "kernel-devel-0:2.6.18-128.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.17.1.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.17.1.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-128.17.1.el5.i386", "product_id": "kernel-headers-0:2.6.18-128.17.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.17.1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.17.1.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-128.17.1.el5.ia64", "product_id": "kernel-xen-0:2.6.18-128.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.17.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.17.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.17.1.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.17.1.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-128.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.17.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.17.1.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.17.1.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-128.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.17.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.17.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.17.1.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-128.17.1.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-128.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.17.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.17.1.el5.ia64", "product": { "name": "kernel-0:2.6.18-128.17.1.el5.ia64", "product_id": "kernel-0:2.6.18-128.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.17.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.17.1.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-128.17.1.el5.ia64", "product_id": "kernel-debug-0:2.6.18-128.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.17.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.17.1.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-128.17.1.el5.ia64", "product_id": "kernel-headers-0:2.6.18-128.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.17.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.17.1.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-128.17.1.el5.ia64", "product_id": "kernel-devel-0:2.6.18-128.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.17.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.17.1.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.17.1.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-128.17.1.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-128.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.17.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.17.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.17.1.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.17.1.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-128.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.17.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.17.1.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.17.1.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-128.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.17.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.17.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.17.1.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-128.17.1.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-128.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.17.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.17.1.el5.x86_64", "product": { "name": "kernel-0:2.6.18-128.17.1.el5.x86_64", "product_id": "kernel-0:2.6.18-128.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.17.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.17.1.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-128.17.1.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-128.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.17.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.17.1.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-128.17.1.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-128.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.17.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.17.1.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-128.17.1.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-128.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.17.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.17.1.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-128.17.1.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.17.1.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.17.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-128.17.1.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-128.17.1.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-128.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.17.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.17.1.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.17.1.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-128.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.17.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.17.1.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.17.1.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-128.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.17.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.17.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.17.1.el5.ppc64", "product": { "name": "kernel-0:2.6.18-128.17.1.el5.ppc64", "product_id": "kernel-0:2.6.18-128.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.17.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-128.17.1.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-128.17.1.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-128.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.17.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.17.1.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-128.17.1.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-128.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.17.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.17.1.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-128.17.1.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-128.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.17.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.17.1.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-128.17.1.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-128.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.17.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.17.1.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.17.1.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-128.17.1.el5.ppc", "product_id": "kernel-headers-0:2.6.18-128.17.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.17.1.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-128.17.1.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.17.1.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.17.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-128.17.1.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-128.17.1.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-128.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.17.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.17.1.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-128.17.1.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-128.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.17.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.17.1.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-128.17.1.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-128.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.17.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.17.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.17.1.el5.s390x", "product": { "name": "kernel-0:2.6.18-128.17.1.el5.s390x", "product_id": "kernel-0:2.6.18-128.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.17.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-128.17.1.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-128.17.1.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-128.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.17.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.17.1.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-128.17.1.el5.s390x", "product_id": "kernel-debug-0:2.6.18-128.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.17.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.17.1.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-128.17.1.el5.s390x", "product_id": "kernel-headers-0:2.6.18-128.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.17.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.17.1.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-128.17.1.el5.s390x", "product_id": "kernel-devel-0:2.6.18-128.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.17.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.17.1.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-128.17.1.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-128.17.1.el5.noarch", "product_id": "kernel-doc-0:2.6.18-128.17.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-128.17.1.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-128.17.1.el5.src", "product": { "name": "kernel-0:2.6.18-128.17.1.el5.src", "product_id": "kernel-0:2.6.18-128.17.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.17.1.el5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-128.17.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.ia64" }, "product_reference": "kernel-0:2.6.18-128.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-128.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.s390x" }, "product_reference": "kernel-0:2.6.18-128.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.17.1.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.src" }, "product_reference": "kernel-0:2.6.18-128.17.1.el5.src", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-128.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-128.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.17.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-128.17.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-128.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.17.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.17.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-128.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.17.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-128.17.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.17.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-128.17.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.17.1.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-128.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.17.1.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-128.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.17.1.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-128.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.17.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-128.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.17.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.17.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.17.1.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.17.1.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.17.1.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.17.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.17.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.17.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.17.1.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.17.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.17.1.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.17.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.17.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.17.1.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.17.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.17.1.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.17.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.17.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-128.17.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.17.1.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-128.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.17.1.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-128.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.17.1.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-128.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.17.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-128.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-128.17.1.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-doc-0:2.6.18-128.17.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-128.17.1.el5.noarch", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.17.1.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-128.17.1.el5.i386", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-128.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.17.1.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-128.17.1.el5.ppc", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-128.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-128.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-128.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.17.1.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-128.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.17.1.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-128.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.17.1.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.17.1.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.17.1.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.17.1.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.17.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-128.17.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.17.1.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-128.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.17.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-128.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.17.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.17.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.17.1.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.17.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-1188", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "577711" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipv6: skb is unexpectedly freed", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise MRG, as it was fixed since version v2.6.20-rc6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.src", "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-doc-0:2.6.18-128.17.1.el5.noarch", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.i386", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.ppc", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.17.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1188" }, { "category": "external", "summary": "RHBZ#577711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1188", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1188" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188" } ], "release_date": "2007-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-05-25T15:29:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.src", "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-doc-0:2.6.18-128.17.1.el5.noarch", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.i386", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.ppc", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.17.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0439" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.src", "5Server-5.3.Z:kernel-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-doc-0:2.6.18-128.17.1.el5.noarch", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.i386", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.ppc", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.17.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.17.1.el5.s390x", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.17.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.17.1.el5.i686", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.17.1.el5.ia64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.17.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ipv6: skb is unexpectedly freed" } ] }
rhsa-2010_0394
Vulnerability from csaf_redhat
Published
2010-05-05 12:58
Modified
2024-11-05 17:16
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
Updated kernel packages that fix multiple security issues, several bugs,
and add three enhancements are now available for Red Hat Enterprise Linux
4.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security fixes:
* RHSA-2009:1024 introduced a flaw in the ptrace implementation on Itanium
systems. ptrace_check_attach() was not called during certain ptrace()
requests. Under certain circumstances, a local, unprivileged user could use
this flaw to call ptrace() on a process they do not own, giving them
control over that process. (CVE-2010-0729, Important)
* a flaw was found in the kernel's Unidirectional Lightweight Encapsulation
(ULE) implementation. A remote attacker could send a specially-crafted ISO
MPEG-2 Transport Stream (TS) frame to a target system, resulting in a
denial of service. (CVE-2010-1086, Important)
* a use-after-free flaw was found in tcp_rcv_state_process() in the
kernel's TCP/IP protocol suite implementation. If a system using IPv6 had
the IPV6_RECVPKTINFO option set on a listening socket, a remote attacker
could send an IPv6 packet to that system, causing a kernel panic.
(CVE-2010-1188, Important)
* a divide-by-zero flaw was found in azx_position_ok() in the Intel High
Definition Audio driver, snd-hda-intel. A local, unprivileged user could
trigger this flaw to cause a denial of service. (CVE-2010-1085, Moderate)
* an information leak flaw was found in the kernel's USB implementation.
Certain USB errors could result in an uninitialized kernel buffer being
sent to user-space. An attacker with physical access to a target system
could use this flaw to cause an information leak. (CVE-2010-1083, Low)
Red Hat would like to thank Ang Way Chuang for reporting CVE-2010-1086.
Bug fixes:
* a regression prevented the Broadcom BCM5761 network device from working
when in the first (top) PCI-E slot of Hewlett-Packard (HP) Z600 systems.
Note: The card worked in the 2nd or 3rd PCI-E slot. (BZ#567205)
* the Xen hypervisor supports 168 GB of RAM for 32-bit guests. The physical
address range was set incorrectly, however, causing 32-bit,
para-virtualized Red Hat Enterprise Linux 4.8 guests to crash when launched
on AMD64 or Intel 64 hosts that have more than 64 GB of RAM. (BZ#574392)
* RHSA-2009:1024 introduced a regression, causing diskdump to fail on
systems with certain adapters using the qla2xxx driver. (BZ#577234)
* a race condition caused TX to stop in a guest using the virtio_net
driver. (BZ#580089)
* on some systems, using the "arp_validate=3" bonding option caused both
links to show as "down" even though the arp_target was responding to ARP
requests sent by the bonding driver. (BZ#580842)
* in some circumstances, when a Red Hat Enterprise Linux client connected
to a re-booted Windows-based NFS server, server-side filehandle-to-inode
mapping changes caused a kernel panic. "bad_inode_ops" handling was changed
to prevent this. Note: filehandle-to-inode mapping changes may still cause
errors, but not panics. (BZ#582908)
* when installing a Red Hat Enterprise Linux 4 guest via PXE, hard-coded
fixed-size scatterlists could conflict with host requests, causing the
guest's kernel to panic. With this update, dynamically allocated
scatterlists are used, resolving this issue. (BZ#582911)
Enhancements:
* kernel support for connlimit. Note: iptables errata update RHBA-2010:0395
is also required for connlimit to work correctly. (BZ#563223)
* support for the Intel architectural performance monitoring subsystem
(arch_perfmon). On supported CPUs, arch_perfmon offers means to mark
performance events and options for configuring and counting these events.
(BZ#582913)
* kernel support for OProfile sampling of Intel microarchitecture (Nehalem)
CPUs. This update alone does not address OProfile support for such CPUs. A
future oprofile package update will allow OProfile to work on Intel Nehalem
CPUs. (BZ#582241)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues and add these enhancements. The system must
be rebooted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix multiple security issues, several bugs,\nand add three enhancements are now available for Red Hat Enterprise Linux\n4.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* RHSA-2009:1024 introduced a flaw in the ptrace implementation on Itanium\nsystems. ptrace_check_attach() was not called during certain ptrace()\nrequests. Under certain circumstances, a local, unprivileged user could use\nthis flaw to call ptrace() on a process they do not own, giving them\ncontrol over that process. (CVE-2010-0729, Important)\n\n* a flaw was found in the kernel\u0027s Unidirectional Lightweight Encapsulation\n(ULE) implementation. A remote attacker could send a specially-crafted ISO\nMPEG-2 Transport Stream (TS) frame to a target system, resulting in a\ndenial of service. (CVE-2010-1086, Important)\n\n* a use-after-free flaw was found in tcp_rcv_state_process() in the\nkernel\u0027s TCP/IP protocol suite implementation. If a system using IPv6 had\nthe IPV6_RECVPKTINFO option set on a listening socket, a remote attacker\ncould send an IPv6 packet to that system, causing a kernel panic.\n(CVE-2010-1188, Important)\n\n* a divide-by-zero flaw was found in azx_position_ok() in the Intel High\nDefinition Audio driver, snd-hda-intel. A local, unprivileged user could\ntrigger this flaw to cause a denial of service. (CVE-2010-1085, Moderate)\n\n* an information leak flaw was found in the kernel\u0027s USB implementation.\nCertain USB errors could result in an uninitialized kernel buffer being\nsent to user-space. An attacker with physical access to a target system\ncould use this flaw to cause an information leak. (CVE-2010-1083, Low)\n\nRed Hat would like to thank Ang Way Chuang for reporting CVE-2010-1086.\n\nBug fixes:\n\n* a regression prevented the Broadcom BCM5761 network device from working\nwhen in the first (top) PCI-E slot of Hewlett-Packard (HP) Z600 systems.\nNote: The card worked in the 2nd or 3rd PCI-E slot. (BZ#567205)\n\n* the Xen hypervisor supports 168 GB of RAM for 32-bit guests. The physical\naddress range was set incorrectly, however, causing 32-bit,\npara-virtualized Red Hat Enterprise Linux 4.8 guests to crash when launched\non AMD64 or Intel 64 hosts that have more than 64 GB of RAM. (BZ#574392)\n\n* RHSA-2009:1024 introduced a regression, causing diskdump to fail on\nsystems with certain adapters using the qla2xxx driver. (BZ#577234)\n\n* a race condition caused TX to stop in a guest using the virtio_net\ndriver. (BZ#580089)\n\n* on some systems, using the \"arp_validate=3\" bonding option caused both\nlinks to show as \"down\" even though the arp_target was responding to ARP\nrequests sent by the bonding driver. (BZ#580842)\n\n* in some circumstances, when a Red Hat Enterprise Linux client connected\nto a re-booted Windows-based NFS server, server-side filehandle-to-inode\nmapping changes caused a kernel panic. \"bad_inode_ops\" handling was changed\nto prevent this. Note: filehandle-to-inode mapping changes may still cause\nerrors, but not panics. (BZ#582908)\n\n* when installing a Red Hat Enterprise Linux 4 guest via PXE, hard-coded\nfixed-size scatterlists could conflict with host requests, causing the\nguest\u0027s kernel to panic. With this update, dynamically allocated\nscatterlists are used, resolving this issue. (BZ#582911)\n\nEnhancements:\n\n* kernel support for connlimit. Note: iptables errata update RHBA-2010:0395\nis also required for connlimit to work correctly. (BZ#563223)\n\n* support for the Intel architectural performance monitoring subsystem\n(arch_perfmon). On supported CPUs, arch_perfmon offers means to mark\nperformance events and options for configuring and counting these events.\n(BZ#582913)\n\n* kernel support for OProfile sampling of Intel microarchitecture (Nehalem)\nCPUs. This update alone does not address OProfile support for such CPUs. A\nfuture oprofile package update will allow OProfile to work on Intel Nehalem\nCPUs. (BZ#582241)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues and add these enhancements. The system must\nbe rebooted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0394", "url": "https://access.redhat.com/errata/RHSA-2010:0394" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "563223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=563223" }, { "category": "external", "summary": "566624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=566624" }, { "category": "external", "summary": "567168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567168" }, { "category": "external", "summary": "567205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567205" }, { "category": "external", "summary": "569237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569237" }, { "category": "external", "summary": "572007", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=572007" }, { "category": "external", "summary": "574392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=574392" }, { "category": "external", "summary": "577234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577234" }, { "category": "external", "summary": "577711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711" }, { "category": "external", "summary": "580089", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=580089" }, { "category": "external", "summary": "580842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=580842" }, { "category": "external", "summary": "582241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=582241" }, { "category": "external", "summary": "582908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=582908" }, { "category": "external", "summary": "582911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=582911" }, { "category": "external", "summary": "582913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=582913" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0394.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-05T17:16:08+00:00", "generator": { "date": "2024-11-05T17:16:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2010:0394", "initial_release_date": "2010-05-05T12:58:00+00:00", "revision_history": [ { "date": "2010-05-05T12:58:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-05-05T09:05:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T17:16:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.25.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.0.25.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "product": { "name": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "product_id": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.25.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-89.0.25.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-89.0.25.EL.i686", "product_id": "kernel-smp-0:2.6.9-89.0.25.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.25.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-89.0.25.EL.i686", "product": { "name": "kernel-xenU-0:2.6.9-89.0.25.EL.i686", "product_id": "kernel-xenU-0:2.6.9-89.0.25.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.25.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.25.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.0.25.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.25.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.i686", "product_id": "kernel-devel-0:2.6.9-89.0.25.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.25.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.25.EL.i686", "product": { "name": "kernel-0:2.6.9-89.0.25.EL.i686", "product_id": "kernel-0:2.6.9-89.0.25.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.25.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.25.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.25.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.25.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.ia64", "product_id": "kernel-devel-0:2.6.9-89.0.25.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.25.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.25.EL.ia64", "product": { "name": "kernel-0:2.6.9-89.0.25.EL.ia64", "product_id": "kernel-0:2.6.9-89.0.25.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.25.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "product_id": "kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.25.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.25.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.25.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "product": { "name": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "product_id": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.25.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.25.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "product": { "name": "kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "product_id": "kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.25.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.25.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.25.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.25.EL.x86_64", "product": { "name": "kernel-0:2.6.9-89.0.25.EL.x86_64", "product_id": "kernel-0:2.6.9-89.0.25.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.25.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "product_id": "kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.25.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-89.0.25.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-89.0.25.EL.noarch", "product_id": "kernel-doc-0:2.6.9-89.0.25.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.0.25.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.0.25.EL.src", "product": { "name": "kernel-0:2.6.9-89.0.25.EL.src", "product_id": "kernel-0:2.6.9-89.0.25.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.25.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.25.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.25.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.25.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.25.EL.ppc64", "product": { "name": "kernel-0:2.6.9-89.0.25.EL.ppc64", "product_id": "kernel-0:2.6.9-89.0.25.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.25.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "product_id": "kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.25.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.25.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.25.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.25.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.25.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.25.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.s390x", "product_id": "kernel-devel-0:2.6.9-89.0.25.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.25.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.25.EL.s390x", "product": { "name": "kernel-0:2.6.9-89.0.25.EL.s390x", "product_id": "kernel-0:2.6.9-89.0.25.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.25.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.25.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.25.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.s390", "product_id": "kernel-devel-0:2.6.9-89.0.25.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.25.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.25.EL.s390", "product": { "name": "kernel-0:2.6.9-89.0.25.EL.s390", "product_id": "kernel-0:2.6.9-89.0.25.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.25.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.25.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.25.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.25.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.25.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.25.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-89.0.25.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.25.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.25.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.25.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.25.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.25.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-89.0.25.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.25.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.25.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.25.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.25.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.25.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.25.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.25.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-89.0.25.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.25.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.25.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.25.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.25.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.25.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.25.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.25.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-89.0.25.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.25.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.25.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-0729", "discovery_date": "2010-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "572007" } ], "notes": [ { "category": "description", "text": "A certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 4 on the ia64 platform allows local users to use ptrace on an arbitrary process, and consequently gain privileges, via vectors related to a missing ptrace_check_attach call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ia64: ptrace: peek_or_poke requests miss ptrace_check_attach()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3, 5 or Red Hat Enterprise MRG, as they do not include the internal change introducing this flaw. A future update in Red Hat Enterprise Linux 4 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-0:2.6.9-89.0.25.EL.src", "4AS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.25.EL.src", "4Desktop:kernel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-0:2.6.9-89.0.25.EL.src", "4ES:kernel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-0:2.6.9-89.0.25.EL.src", "4WS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0729" }, { "category": "external", "summary": "RHBZ#572007", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=572007" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0729", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0729" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0729", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0729" } ], "release_date": "2010-02-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-05-05T12:58:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-0:2.6.9-89.0.25.EL.src", "4AS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.25.EL.src", "4Desktop:kernel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-0:2.6.9-89.0.25.EL.src", "4ES:kernel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-0:2.6.9-89.0.25.EL.src", "4WS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0394" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-0:2.6.9-89.0.25.EL.src", "4AS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.25.EL.src", "4Desktop:kernel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-0:2.6.9-89.0.25.EL.src", "4ES:kernel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-0:2.6.9-89.0.25.EL.src", "4WS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ia64: ptrace: peek_or_poke requests miss ptrace_check_attach()" }, { "acknowledgments": [ { "names": [ "Marcus Meissner" ] } ], "cve": "CVE-2010-1083", "discovery_date": "2010-02-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "566624" } ], "notes": [ { "category": "description", "text": "The processcompl_compat function in drivers/usb/core/devio.c in Linux kernel 2.6.x through 2.6.32, and possibly other versions, does not clear the transfer buffer before returning to userspace when a USB command fails, which might make it easier for physically proximate attackers to obtain sensitive information (kernel memory).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: information leak via userspace USB interface", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue has been rated as having low security impact.\n\nA future update in Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG may address this flaw. This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-0:2.6.9-89.0.25.EL.src", "4AS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.25.EL.src", "4Desktop:kernel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-0:2.6.9-89.0.25.EL.src", "4ES:kernel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-0:2.6.9-89.0.25.EL.src", "4WS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1083" }, { "category": "external", "summary": "RHBZ#566624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=566624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1083", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1083" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1083", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1083" } ], "release_date": "2010-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-05-05T12:58:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-0:2.6.9-89.0.25.EL.src", "4AS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.25.EL.src", "4Desktop:kernel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-0:2.6.9-89.0.25.EL.src", "4ES:kernel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-0:2.6.9-89.0.25.EL.src", "4WS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0394" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-0:2.6.9-89.0.25.EL.src", "4AS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.25.EL.src", "4Desktop:kernel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-0:2.6.9-89.0.25.EL.src", "4ES:kernel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-0:2.6.9-89.0.25.EL.src", "4WS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: information leak via userspace USB interface" }, { "cve": "CVE-2010-1085", "discovery_date": "2010-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "567168" } ], "notes": [ { "category": "description", "text": "The azx_position_ok function in hda_intel.c in Linux kernel 2.6.33-rc4 and earlier, when running on the AMD780V chip set, allows context-dependent attackers to cause a denial of service (crash) via unknown manipulations that trigger a divide-by-zero error.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ALSA: hda-intel: Avoid divide by zero crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3 and Red Hat Enterprise MRG as they did not include the affected function. A future update in Red Hat Enterprise Linux 4 and 5 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-0:2.6.9-89.0.25.EL.src", "4AS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.25.EL.src", "4Desktop:kernel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-0:2.6.9-89.0.25.EL.src", "4ES:kernel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-0:2.6.9-89.0.25.EL.src", "4WS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1085" }, { "category": "external", "summary": "RHBZ#567168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1085", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1085" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1085", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1085" } ], "release_date": "2010-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-05-05T12:58:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-0:2.6.9-89.0.25.EL.src", "4AS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.25.EL.src", "4Desktop:kernel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-0:2.6.9-89.0.25.EL.src", "4ES:kernel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-0:2.6.9-89.0.25.EL.src", "4WS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0394" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-0:2.6.9-89.0.25.EL.src", "4AS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.25.EL.src", "4Desktop:kernel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-0:2.6.9-89.0.25.EL.src", "4ES:kernel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-0:2.6.9-89.0.25.EL.src", "4WS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: ALSA: hda-intel: Avoid divide by zero crash" }, { "acknowledgments": [ { "names": [ "Ang Way Chuang" ] } ], "cve": "CVE-2010-1086", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2010-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "569237" } ], "notes": [ { "category": "description", "text": "The ULE decapsulation functionality in drivers/media/dvb/dvb-core/dvb_net.c in dvb-core in Linux kernel 2.6.33 and earlier allows attackers to cause a denial of service (infinite loop) via a crafted MPEG2-TS frame, related to an invalid Payload Pointer ULE.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: dvb-core: DoS bug in ULE decapsulation code", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise Linux 3 as it did not include support for ULE (Unidirectional Lightweight Encapsulation). We have included a fix for this issue in Red Hat Enterprise Linux 4 and 5 however the affected module is not build by default.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-0:2.6.9-89.0.25.EL.src", "4AS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.25.EL.src", "4Desktop:kernel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-0:2.6.9-89.0.25.EL.src", "4ES:kernel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-0:2.6.9-89.0.25.EL.src", "4WS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1086" }, { "category": "external", "summary": "RHBZ#569237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569237" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1086", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1086" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1086", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1086" } ], "release_date": "2010-02-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-05-05T12:58:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-0:2.6.9-89.0.25.EL.src", "4AS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.25.EL.src", "4Desktop:kernel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-0:2.6.9-89.0.25.EL.src", "4ES:kernel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-0:2.6.9-89.0.25.EL.src", "4WS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0394" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-0:2.6.9-89.0.25.EL.src", "4AS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.25.EL.src", "4Desktop:kernel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-0:2.6.9-89.0.25.EL.src", "4ES:kernel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-0:2.6.9-89.0.25.EL.src", "4WS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: dvb-core: DoS bug in ULE decapsulation code" }, { "cve": "CVE-2010-1188", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "577711" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipv6: skb is unexpectedly freed", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise MRG, as it was fixed since version v2.6.20-rc6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-0:2.6.9-89.0.25.EL.src", "4AS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.25.EL.src", "4Desktop:kernel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-0:2.6.9-89.0.25.EL.src", "4ES:kernel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-0:2.6.9-89.0.25.EL.src", "4WS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1188" }, { "category": "external", "summary": "RHBZ#577711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1188", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1188" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188" } ], "release_date": "2007-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-05-05T12:58:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-0:2.6.9-89.0.25.EL.src", "4AS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.25.EL.src", "4Desktop:kernel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-0:2.6.9-89.0.25.EL.src", "4ES:kernel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-0:2.6.9-89.0.25.EL.src", "4WS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0394" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-0:2.6.9-89.0.25.EL.src", "4AS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.25.EL.src", "4Desktop:kernel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-0:2.6.9-89.0.25.EL.src", "4ES:kernel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-0:2.6.9-89.0.25.EL.src", "4WS:kernel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.25.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.25.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.25.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ipv6: skb is unexpectedly freed" } ] }
rhsa-2010_0882
Vulnerability from csaf_redhat
Published
2010-11-12 09:36
Modified
2024-11-05 17:23
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix several security issues and one bug are
now available for Red Hat Enterprise Linux 3 Extended Life Cycle Support
(ELS).
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issues:
* An array index error was found in the gdth driver in the Linux kernel. A
local user could send a specially-crafted IOCTL request that would cause a
denial of service or, possibly, privilege escalation. (CVE-2009-3080,
Important)
* NULL pointer dereference flaws were found in the r128 driver in the Linux
kernel. Checks to test if the Concurrent Command Engine state was
initialized were missing in private IOCTL functions. An attacker could use
these flaws to cause a local denial of service or escalate their
privileges. (CVE-2009-3620, Important)
* A flaw was found in the Intel PRO/1000 Linux driver, e1000, in the Linux
kernel. A remote attacker using packets larger than the MTU could bypass
the existing fragment check, resulting in partial, invalid frames being
passed to the network stack. This flaw could also possibly be used to
trigger a remote denial of service. (CVE-2009-4536, Important)
* A use-after-free flaw was found in the tcp_rcv_state_process() function
in the Linux kernel TCP/IP protocol suite implementation. If a system using
IPv6 had the IPV6_PKTINFO option set on a listening socket, a remote
attacker could send an IPv6 packet to that system, causing a kernel panic
(denial of service). (CVE-2010-1188, Important)
* When an application has a stack overflow, the stack could silently
overwrite another memory mapped area instead of a segmentation fault
occurring, which could cause an application to execute arbitrary code,
possibly leading to privilege escalation. It is known that the X Window
System server can be used to trigger this flaw. (CVE-2010-2240, Important)
* The compat_alloc_user_space() function in the Linux kernel 32/64-bit
compatibility layer implementation was missing sanity checks. This function
could be abused in other areas of the Linux kernel. On 64-bit systems, a
local, unprivileged user could use this flaw to escalate their privileges.
(CVE-2010-3081, Important)
Red Hat would like to thank the X.Org security team for reporting the
CVE-2010-2240 issue, with upstream acknowledging Rafal Wojtczuk as the
original reporter; and Ben Hawkes for reporting the CVE-2010-3081 issue.
This update also fixes the following bug:
* The RHSA-2009:1550 kernel update introduced a regression that prevented
certain custom kernel modules from loading, failing with "unresolved
symbol" errors. This update corrects this issue, allowing the affected
modules to load as expected. (BZ#556909)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues and one bug are\nnow available for Red Hat Enterprise Linux 3 Extended Life Cycle Support\n(ELS).\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* An array index error was found in the gdth driver in the Linux kernel. A\nlocal user could send a specially-crafted IOCTL request that would cause a\ndenial of service or, possibly, privilege escalation. (CVE-2009-3080,\nImportant)\n\n* NULL pointer dereference flaws were found in the r128 driver in the Linux\nkernel. Checks to test if the Concurrent Command Engine state was\ninitialized were missing in private IOCTL functions. An attacker could use\nthese flaws to cause a local denial of service or escalate their\nprivileges. (CVE-2009-3620, Important)\n\n* A flaw was found in the Intel PRO/1000 Linux driver, e1000, in the Linux\nkernel. A remote attacker using packets larger than the MTU could bypass\nthe existing fragment check, resulting in partial, invalid frames being\npassed to the network stack. This flaw could also possibly be used to\ntrigger a remote denial of service. (CVE-2009-4536, Important)\n\n* A use-after-free flaw was found in the tcp_rcv_state_process() function\nin the Linux kernel TCP/IP protocol suite implementation. If a system using\nIPv6 had the IPV6_PKTINFO option set on a listening socket, a remote\nattacker could send an IPv6 packet to that system, causing a kernel panic\n(denial of service). (CVE-2010-1188, Important)\n\n* When an application has a stack overflow, the stack could silently\noverwrite another memory mapped area instead of a segmentation fault\noccurring, which could cause an application to execute arbitrary code,\npossibly leading to privilege escalation. It is known that the X Window\nSystem server can be used to trigger this flaw. (CVE-2010-2240, Important)\n\n* The compat_alloc_user_space() function in the Linux kernel 32/64-bit\ncompatibility layer implementation was missing sanity checks. This function\ncould be abused in other areas of the Linux kernel. On 64-bit systems, a\nlocal, unprivileged user could use this flaw to escalate their privileges.\n(CVE-2010-3081, Important)\n\nRed Hat would like to thank the X.Org security team for reporting the\nCVE-2010-2240 issue, with upstream acknowledging Rafal Wojtczuk as the\noriginal reporter; and Ben Hawkes for reporting the CVE-2010-3081 issue.\n\nThis update also fixes the following bug:\n\n* The RHSA-2009:1550 kernel update introduced a regression that prevented\ncertain custom kernel modules from loading, failing with \"unresolved\nsymbol\" errors. This update corrects this issue, allowing the affected\nmodules to load as expected. (BZ#556909)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0882", "url": "https://access.redhat.com/errata/RHSA-2010:0882" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/kb/docs/DOC-40265", "url": "https://access.redhat.com/kb/docs/DOC-40265" }, { "category": "external", "summary": "http://www.redhat.com/rhel/server/extended_lifecycle_support/", "url": "http://www.redhat.com/rhel/server/extended_lifecycle_support/" }, { "category": "external", "summary": "529597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597" }, { "category": "external", "summary": "539414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539414" }, { "category": "external", "summary": "552126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "category": "external", "summary": "556909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=556909" }, { "category": "external", "summary": "577711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711" }, { "category": "external", "summary": "606611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=606611" }, { "category": "external", "summary": "634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0882.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-05T17:23:50+00:00", "generator": { "date": "2024-11-05T17:23:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2010:0882", "initial_release_date": "2010-11-12T09:36:00+00:00", "revision_history": [ { "date": "2010-11-12T09:36:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-11-12T04:36:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T17:23:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (v. 3 ELS)", "product": { "name": "Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:3::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES (v. 3 ELS)", "product": { "name": "Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:3::es" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-BOOT-0:2.4.21-66.EL.i386", "product": { "name": "kernel-BOOT-0:2.4.21-66.EL.i386", "product_id": "kernel-BOOT-0:2.4.21-66.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-66.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-66.EL.i386", "product": { "name": "kernel-doc-0:2.4.21-66.EL.i386", "product_id": "kernel-doc-0:2.4.21-66.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-66.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-66.EL.i386", "product": { "name": "kernel-debuginfo-0:2.4.21-66.EL.i386", "product_id": "kernel-debuginfo-0:2.4.21-66.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-66.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-66.EL.i386", "product": { "name": "kernel-source-0:2.4.21-66.EL.i386", "product_id": "kernel-source-0:2.4.21-66.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-66.EL?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-66.EL.i686", "product": { "name": "kernel-unsupported-0:2.4.21-66.EL.i686", "product_id": "kernel-unsupported-0:2.4.21-66.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-66.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.4.21-66.EL.i686", "product": { "name": "kernel-hugemem-0:2.4.21-66.EL.i686", "product_id": "kernel-hugemem-0:2.4.21-66.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-66.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-66.EL.i686", "product": { "name": "kernel-0:2.4.21-66.EL.i686", "product_id": "kernel-0:2.4.21-66.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-66.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686", "product": { "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686", "product_id": "kernel-smp-unsupported-0:2.4.21-66.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-66.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-66.EL.i686", "product": { "name": "kernel-debuginfo-0:2.4.21-66.EL.i686", "product_id": "kernel-debuginfo-0:2.4.21-66.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-66.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-66.EL.i686", "product": { "name": "kernel-smp-0:2.4.21-66.EL.i686", "product_id": "kernel-smp-0:2.4.21-66.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-66.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "product": { "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "product_id": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-66.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-66.EL.athlon", "product": { "name": "kernel-unsupported-0:2.4.21-66.EL.athlon", "product_id": "kernel-unsupported-0:2.4.21-66.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-66.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-66.EL.athlon", "product": { "name": "kernel-0:2.4.21-66.EL.athlon", "product_id": "kernel-0:2.4.21-66.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-66.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "product": { "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "product_id": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-66.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon", "product": { "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon", "product_id": "kernel-debuginfo-0:2.4.21-66.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-66.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-66.EL.athlon", "product": { "name": "kernel-smp-0:2.4.21-66.EL.athlon", "product_id": "kernel-smp-0:2.4.21-66.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-66.EL?arch=athlon" } } } ], "category": "architecture", "name": "athlon" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-66.EL.src", "product": { "name": "kernel-0:2.4.21-66.EL.src", "product_id": "kernel-0:2.4.21-66.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-66.EL?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-66.EL.src as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-0:2.4.21-66.EL.src" }, "product_reference": "kernel-0:2.4.21-66.EL.src", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-66.EL.src as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-0:2.4.21-66.EL.src" }, "product_reference": "kernel-0:2.4.21-66.EL.src", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3ES-ELS" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-3080", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "539414" } ], "notes": [ { "category": "description", "text": "Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: gdth: Prevent negative offsets in ioctl", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3080" }, { "category": "external", "summary": "RHBZ#539414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539414" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3080", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3080" } ], "release_date": "2009-11-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-12T09:36:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0882" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: gdth: Prevent negative offsets in ioctl" }, { "cve": "CVE-2009-3620", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2009-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "529597" } ], "notes": [ { "category": "description", "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3620" }, { "category": "external", "summary": "RHBZ#529597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620" } ], "release_date": "2009-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-12T09:36:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0882" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised" }, { "cve": "CVE-2009-4536", "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "552126" } ], "notes": [ { "category": "description", "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: e1000 issue reported at 26c3", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4536" }, { "category": "external", "summary": "RHBZ#552126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4536", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-12T09:36:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0882" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C", "version": "2.0" }, "products": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: e1000 issue reported at 26c3" }, { "cve": "CVE-2010-1188", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "577711" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipv6: skb is unexpectedly freed", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise MRG, as it was fixed since version v2.6.20-rc6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1188" }, { "category": "external", "summary": "RHBZ#577711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1188", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1188" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188" } ], "release_date": "2007-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-12T09:36:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0882" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ipv6: skb is unexpectedly freed" }, { "acknowledgments": [ { "names": [ "X.Org security team" ] }, { "names": [ "Rafal Wojtczuk" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2010-2240", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "606611" } ], "notes": [ { "category": "description", "text": "The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: keep a guard page below a grow-down stack segment", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2240" }, { "category": "external", "summary": "RHBZ#606611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=606611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2240", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2240" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2240", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2240" } ], "release_date": "2010-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-12T09:36:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0882" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mm: keep a guard page below a grow-down stack segment" }, { "acknowledgments": [ { "names": [ "Ben Hawkes" ] } ], "cve": "CVE-2010-3081", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "634457" } ], "notes": [ { "category": "description", "text": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow", "title": "Vulnerability summary" }, { "category": "other", "text": "More information can be found in this kbase: https://access.redhat.com/kb/docs/DOC-40265.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3081" }, { "category": "external", "summary": "RHBZ#634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3081", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-12T09:36:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0882" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow" } ] }
rhsa-2010_0178
Vulnerability from csaf_redhat
Published
2010-03-29 12:00
Modified
2024-11-05 17:14
Summary
Red Hat Security Advisory: Red Hat Enterprise Linux 5.5 kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix three security issues, address several
hundred bugs, and add numerous enhancements are now available as part of
the ongoing support and maintenance of Red Hat Enterprise Linux version 5.
This is the fifth regular update.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issues:
* a race condition was found in the mac80211 implementation, a framework
used for writing drivers for wireless devices. An attacker could trigger
this flaw by sending a Delete Block ACK (DELBA) packet to a target system,
resulting in a remote denial of service. Note: This issue only affected
users on 802.11n networks, and that also use the iwlagn driver with Intel
wireless hardware. (CVE-2009-4027, Important)
* a flaw was found in the gfs2_lock() implementation. The GFS2 locking code
could skip the lock operation for files that have the S_ISGID bit
(set-group-ID on execution) in their mode set. A local, unprivileged user
on a system that has a GFS2 file system mounted could use this flaw to
cause a kernel panic. (CVE-2010-0727, Moderate)
* a divide-by-zero flaw was found in the ext4 file system code. A local
attacker could use this flaw to cause a denial of service by mounting a
specially-crafted ext4 file system. (CVE-2009-4307, Low)
These updated packages also include several hundred bug fixes for and
enhancements to the Linux kernel. Space precludes documenting each of these
changes in this advisory and users are directed to the Red Hat Enterprise
Linux 5.5 Release Notes for information on the most significant of these
changes:
http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Release_Notes/
Also, for details concerning every bug fixed in and every enhancement added
to the kernel for this release, refer to the kernel chapter in the Red Hat
Enterprise Linux 5.5 Technical Notes:
http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Technical_Notes/kernel.html
All Red Hat Enterprise Linux 5 users are advised to install these updated
packages, which address these vulnerabilities as well as fixing the bugs
and adding the enhancements noted in the Red Hat Enterprise Linux 5.5
Release Notes and Technical Notes. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix three security issues, address several\nhundred bugs, and add numerous enhancements are now available as part of\nthe ongoing support and maintenance of Red Hat Enterprise Linux version 5.\nThis is the fifth regular update.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a race condition was found in the mac80211 implementation, a framework\nused for writing drivers for wireless devices. An attacker could trigger\nthis flaw by sending a Delete Block ACK (DELBA) packet to a target system,\nresulting in a remote denial of service. Note: This issue only affected\nusers on 802.11n networks, and that also use the iwlagn driver with Intel\nwireless hardware. (CVE-2009-4027, Important)\n\n* a flaw was found in the gfs2_lock() implementation. The GFS2 locking code\ncould skip the lock operation for files that have the S_ISGID bit\n(set-group-ID on execution) in their mode set. A local, unprivileged user\non a system that has a GFS2 file system mounted could use this flaw to\ncause a kernel panic. (CVE-2010-0727, Moderate)\n\n* a divide-by-zero flaw was found in the ext4 file system code. A local\nattacker could use this flaw to cause a denial of service by mounting a\nspecially-crafted ext4 file system. (CVE-2009-4307, Low)\n\nThese updated packages also include several hundred bug fixes for and\nenhancements to the Linux kernel. Space precludes documenting each of these\nchanges in this advisory and users are directed to the Red Hat Enterprise\nLinux 5.5 Release Notes for information on the most significant of these\nchanges:\n\nhttp://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Release_Notes/\n\nAlso, for details concerning every bug fixed in and every enhancement added\nto the kernel for this release, refer to the kernel chapter in the Red Hat\nEnterprise Linux 5.5 Technical Notes:\n\nhttp://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Technical_Notes/kernel.html\n\nAll Red Hat Enterprise Linux 5 users are advised to install these updated\npackages, which address these vulnerabilities as well as fixing the bugs\nand adding the enhancements noted in the Red Hat Enterprise Linux 5.5\nRelease Notes and Technical Notes. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0178", "url": "https://access.redhat.com/errata/RHSA-2010:0178" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Release_Notes/", "url": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Release_Notes/" }, { "category": "external", "summary": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Technical_Notes/kernel.html", "url": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Technical_Notes/kernel.html" }, { "category": "external", "summary": "250561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250561" }, { "category": "external", "summary": "322881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=322881" }, { "category": "external", "summary": "427709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427709" }, { "category": "external", "summary": "446061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=446061" }, { "category": "external", "summary": "448130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=448130" }, { "category": "external", "summary": "450121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=450121" }, { "category": "external", "summary": "452129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452129" }, { "category": "external", "summary": "456181", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456181" }, { "category": "external", "summary": "461100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=461100" }, { "category": "external", "summary": "461442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=461442" }, { "category": "external", "summary": "461506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=461506" }, { "category": "external", "summary": "466681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=466681" }, { "category": "external", "summary": "469976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=469976" }, { "category": "external", "summary": "473404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=473404" }, { "category": "external", "summary": "476075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=476075" }, { "category": "external", "summary": "481658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=481658" }, { "category": "external", "summary": "482756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=482756" }, { "category": "external", "summary": "483646", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=483646" }, { "category": "external", "summary": "485016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=485016" }, { "category": "external", "summary": "485099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=485099" }, { "category": "external", "summary": "486092", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486092" }, { "category": "external", "summary": "486975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486975" }, { "category": "external", "summary": "487346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487346" }, { "category": "external", "summary": "487763", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487763" }, { "category": "external", "summary": "488161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488161" }, { "category": "external", "summary": "489566", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=489566" }, { "category": "external", "summary": "489774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=489774" }, { "category": "external", "summary": "489931", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=489931" }, { "category": "external", "summary": "491010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491010" }, { "category": "external", "summary": "493517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493517" }, { "category": "external", "summary": "494120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494120" }, { "category": "external", "summary": "495059", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495059" }, { "category": "external", "summary": "496716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496716" }, { "category": "external", "summary": "496847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496847" }, { "category": "external", "summary": "497200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497200" }, { "category": "external", "summary": "497257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497257" }, { "category": "external", "summary": "498461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=498461" }, { "category": "external", "summary": "498489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=498489" }, { "category": "external", "summary": "498510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=498510" }, { "category": "external", "summary": "498532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=498532" }, { "category": "external", "summary": "498976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=498976" }, { "category": "external", "summary": "499019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499019" }, { "category": "external", "summary": "499063", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499063" }, { "category": "external", "summary": "499253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499253" }, { "category": "external", "summary": "499884", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499884" }, { "category": "external", "summary": "500346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500346" }, { "category": "external", "summary": "500653", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500653" }, { "category": "external", "summary": "500838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500838" }, { "category": "external", "summary": "501030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501030" }, { "category": "external", "summary": "501075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501075" }, { "category": "external", "summary": "502491", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502491" }, { "category": "external", "summary": "502531", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502531" }, { "category": "external", "summary": "502572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502572" }, { "category": "external", "summary": "502822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502822" }, { "category": "external", "summary": "502826", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502826" }, { "category": "external", "summary": "502927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502927" }, { "category": "external", "summary": "502965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502965" }, { "category": "external", "summary": "505331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=505331" }, { "category": "external", "summary": "506200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=506200" }, { "category": "external", "summary": "506217", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=506217" }, { "category": "external", "summary": "506799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=506799" }, { "category": "external", "summary": "506899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=506899" }, { "category": "external", "summary": "507159", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=507159" }, { "category": "external", "summary": "507549", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=507549" }, { "category": "external", "summary": "509625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=509625" }, { "category": "external", "summary": "509713", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=509713" }, { "category": "external", "summary": "509809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=509809" }, { "category": "external", "summary": "509866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=509866" }, { "category": "external", "summary": "509962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=509962" }, { "category": "external", "summary": "510225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510225" }, { "category": "external", "summary": "510257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510257" }, { "category": "external", "summary": "510746", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510746" }, { "category": "external", "summary": "510814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510814" }, { "category": "external", "summary": "510818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510818" }, { "category": "external", "summary": "511170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511170" }, { "category": "external", "summary": "511211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511211" }, { "category": "external", "summary": "511278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511278" }, { "category": "external", "summary": "511374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511374" }, { "category": "external", "summary": "512006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512006" }, { "category": "external", "summary": "512013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512013" }, { "category": "external", "summary": "512203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512203" }, { "category": "external", "summary": "512361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512361" }, { "category": "external", "summary": "512552", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512552" }, { "category": "external", "summary": "513136", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513136" }, { "category": "external", "summary": "513203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513203" }, { "category": "external", "summary": "513410", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513410" }, { "category": "external", "summary": "513692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513692" }, { "category": "external", "summary": "513827", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513827" }, { "category": "external", "summary": "514141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=514141" }, { "category": "external", "summary": "514147", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=514147" }, { "category": "external", "summary": "514250", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=514250" }, { "category": "external", "summary": "514256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=514256" }, { "category": "external", "summary": "514589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=514589" }, { "category": "external", "summary": "514654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=514654" }, { "category": "external", "summary": "515176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515176" }, { "category": "external", "summary": "515252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515252" }, { "category": "external", "summary": "515312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515312" }, { "category": "external", "summary": "515405", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515405" }, { "category": "external", "summary": "515408", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515408" }, { "category": "external", "summary": "515529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515529" }, { "category": "external", "summary": "515716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515716" }, { "category": "external", "summary": "515753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515753" }, { "category": "external", "summary": "515812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515812" }, { "category": "external", "summary": "516541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516541" }, { "category": "external", "summary": "516589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516589" }, { "category": "external", "summary": "516833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516833" }, { "category": "external", "summary": "516881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516881" }, { "category": "external", "summary": "517377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517377" }, { "category": "external", "summary": "517378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517378" }, { "category": "external", "summary": "517454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517454" }, { "category": "external", "summary": "517504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517504" }, { "category": "external", "summary": "517893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517893" }, { "category": "external", "summary": "517922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517922" }, { "category": "external", "summary": "517928", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517928" }, { "category": "external", "summary": "518103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518103" }, { "category": "external", "summary": "518106", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518106" }, { "category": "external", "summary": "518496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518496" }, { "category": "external", "summary": "519049", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519049" }, { "category": "external", "summary": "519076", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519076" }, { "category": "external", "summary": "519086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519086" }, { "category": "external", "summary": "519091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519091" }, { "category": "external", "summary": "519112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519112" }, { "category": "external", "summary": "519184", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519184" }, { "category": "external", "summary": "519447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519447" }, { "category": "external", "summary": "519453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519453" }, { "category": "external", "summary": "519771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519771" }, { "category": "external", "summary": "520192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=520192" }, { "category": "external", "summary": "520297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=520297" }, { "category": "external", "summary": "520867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=520867" }, { "category": "external", "summary": "521081", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521081" }, { "category": "external", "summary": "521093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521093" }, { "category": "external", "summary": "521203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521203" }, { "category": "external", "summary": "521345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521345" }, { "category": "external", "summary": "521865", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521865" }, { "category": "external", "summary": "522600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522600" }, { "category": "external", "summary": "522629", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522629" }, { "category": "external", "summary": "522745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522745" }, { "category": "external", "summary": "522846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522846" }, { "category": "external", "summary": "523335", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=523335" }, { "category": "external", "summary": "523450", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=523450" }, { "category": "external", "summary": "523888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=523888" }, { "category": "external", "summary": "523982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=523982" }, { "category": "external", "summary": "524052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524052" }, { "category": "external", "summary": "524129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524129" }, { "category": "external", "summary": "524335", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524335" }, { "category": "external", "summary": "524651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524651" }, { "category": "external", "summary": "524702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524702" }, { "category": "external", "summary": "524787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524787" }, { "category": "external", "summary": "525100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=525100" }, { "category": "external", "summary": "525390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=525390" }, { "category": "external", "summary": "525467", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=525467" }, { "category": "external", "summary": "526043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526043" }, { "category": "external", "summary": "526092", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526092" }, { "category": "external", "summary": "526259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526259" }, { "category": "external", "summary": "526481", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526481" }, { "category": "external", "summary": "526612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526612" }, { "category": "external", "summary": "526751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526751" }, { "category": "external", "summary": "526819", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526819" }, { "category": "external", "summary": "526888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526888" }, { "category": "external", "summary": "527424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=527424" }, { "category": "external", "summary": "527496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=527496" }, { "category": "external", "summary": "527748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=527748" }, { "category": "external", "summary": "528054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528054" }, { "category": "external", "summary": "528070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528070" }, { "category": "external", "summary": "528153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528153" }, { "category": "external", "summary": "529431", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529431" }, { "category": "external", "summary": "529796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529796" }, { "category": "external", "summary": "530537", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530537" }, { "category": "external", "summary": "531016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531016" }, { "category": "external", "summary": "531268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531268" }, { "category": "external", "summary": "531488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531488" }, { "category": "external", "summary": "531552", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531552" }, { "category": "external", "summary": "531593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531593" }, { "category": "external", "summary": "531784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531784" }, { "category": "external", "summary": "532701", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=532701" }, { "category": "external", "summary": "533489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533489" }, { "category": "external", "summary": "533496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533496" }, { "category": "external", "summary": "534018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=534018" }, { "category": "external", "summary": "534158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=534158" }, { "category": "external", "summary": "537514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537514" }, { "category": "external", "summary": "537876", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537876" }, { "category": "external", "summary": "538407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=538407" }, { "category": "external", "summary": "538484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=538484" }, { "category": "external", "summary": "539240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539240" }, { "category": "external", "summary": "539521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539521" }, { "category": "external", "summary": "540811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540811" }, { "category": "external", "summary": "541149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=541149" }, { "category": "external", "summary": "541213", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=541213" }, { "category": "external", "summary": "541325", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=541325" }, { "category": "external", "summary": "541953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=541953" }, { "category": "external", "summary": "541956", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=541956" }, { "category": "external", "summary": "542593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=542593" }, { "category": "external", "summary": "542746", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=542746" }, { "category": "external", "summary": "542834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=542834" }, { "category": "external", "summary": "543057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=543057" }, { "category": "external", "summary": "543270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=543270" }, { "category": "external", "summary": "543307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=543307" }, { "category": "external", "summary": "544138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=544138" }, { "category": "external", "summary": "544349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=544349" }, { "category": "external", "summary": "544417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=544417" }, { "category": "external", "summary": "544448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=544448" }, { "category": "external", "summary": "545121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=545121" }, { "category": "external", "summary": "545135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=545135" }, { "category": "external", "summary": "545899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=545899" }, { "category": "external", "summary": "546281", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546281" }, { "category": "external", "summary": "546326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546326" }, { "category": "external", "summary": "546624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546624" }, { "category": "external", "summary": "547251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547251" }, { "category": "external", "summary": "547762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547762" }, { "category": "external", "summary": "547980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547980" }, { "category": "external", "summary": "548079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548079" }, { "category": "external", "summary": "548565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548565" }, { "category": "external", "summary": "549397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=549397" }, { "category": "external", "summary": "549460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=549460" }, { "category": "external", "summary": "549465", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=549465" }, { "category": "external", "summary": "549750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=549750" }, { "category": "external", "summary": "549763", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=549763" }, { "category": "external", "summary": "550014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550014" }, { "category": "external", "summary": "550148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550148" }, { "category": "external", "summary": "552675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552675" }, { "category": "external", "summary": "553324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=553324" }, { "category": "external", "summary": "553447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=553447" }, { "category": "external", "summary": "553670", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=553670" }, { "category": "external", "summary": "554078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554078" }, { "category": "external", "summary": "554545", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554545" }, { "category": "external", "summary": "555120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=555120" }, { "category": "external", "summary": "555171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=555171" }, { "category": "external", "summary": "555604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=555604" }, { "category": "external", "summary": "557095", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=557095" }, { "category": "external", "summary": "557109", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=557109" }, { "category": "external", "summary": "557172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=557172" }, { "category": "external", "summary": "557792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=557792" }, { "category": "external", "summary": "557974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=557974" }, { "category": "external", "summary": "558809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=558809" }, { "category": "external", "summary": "559329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559329" }, { "category": "external", "summary": "559410", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559410" }, { "category": "external", "summary": "559711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559711" }, { "category": "external", "summary": "560944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=560944" }, { "category": "external", "summary": "561076", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=561076" }, { "category": "external", "summary": "561322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=561322" }, { "category": "external", "summary": "561578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=561578" }, { "category": "external", "summary": "562006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=562006" }, { "category": "external", "summary": "562947", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=562947" }, { "category": "external", "summary": "564145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=564145" }, { "category": "external", "summary": "564399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=564399" }, { "category": "external", "summary": "564506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=564506" }, { "category": "external", "summary": "565494", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=565494" }, { "category": "external", "summary": "565594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=565594" }, { "category": "external", "summary": "565964", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=565964" }, { "category": "external", "summary": "565965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=565965" }, { "category": "external", "summary": "566016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=566016" }, { "category": "external", "summary": "566221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=566221" }, { "category": "external", "summary": "566696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=566696" }, { "category": "external", "summary": "567718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567718" }, { "category": "external", "summary": "568040", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=568040" }, { "category": "external", "summary": "568153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=568153" }, { "category": "external", "summary": "569610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569610" }, { "category": "external", "summary": "570814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570814" }, { "category": "external", "summary": "570863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570863" }, { "category": "external", "summary": "571818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=571818" }, { "category": "external", "summary": "573098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=573098" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0178.json" } ], "title": "Red Hat Security Advisory: Red Hat Enterprise Linux 5.5 kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-05T17:14:45+00:00", "generator": { "date": "2024-11-05T17:14:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2010:0178", "initial_release_date": "2010-03-29T12:00:00+00:00", "revision_history": [ { "date": "2010-03-29T12:00:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-03-29T08:18:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T17:14:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-194.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-194.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-194.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-194.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-194.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.el5.i686", "product": { "name": "kernel-0:2.6.18-194.el5.i686", "product_id": "kernel-0:2.6.18-194.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-194.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-194.el5.i686", "product_id": "kernel-xen-0:2.6.18-194.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-194.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-194.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-194.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-194.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-194.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-194.el5.i686", "product_id": "kernel-devel-0:2.6.18-194.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-194.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-194.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-194.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-194.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-194.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-194.el5.i686", "product_id": "kernel-PAE-0:2.6.18-194.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-194.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-194.el5.i686", "product_id": "kernel-debug-0:2.6.18-194.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-194.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-194.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-194.el5.i386", "product_id": "kernel-headers-0:2.6.18-194.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-194.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.el5.x86_64", "product": { "name": "kernel-0:2.6.18-194.el5.x86_64", "product_id": "kernel-0:2.6.18-194.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-194.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-194.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-194.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-194.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-194.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-194.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-194.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-194.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-194.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-194.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-194.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-194.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-194.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-194.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-194.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-194.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-194.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-194.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-194.el5.src", "product": { "name": "kernel-0:2.6.18-194.el5.src", "product_id": "kernel-0:2.6.18-194.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-194.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-194.el5.noarch", "product_id": "kernel-doc-0:2.6.18-194.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-194.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-194.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.el5.ia64", "product": { "name": "kernel-0:2.6.18-194.el5.ia64", "product_id": "kernel-0:2.6.18-194.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-194.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-194.el5.ia64", "product_id": "kernel-xen-0:2.6.18-194.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-194.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-194.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-194.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-194.el5.ia64", "product_id": "kernel-devel-0:2.6.18-194.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-194.el5.ia64", "product_id": "kernel-headers-0:2.6.18-194.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-194.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-194.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-194.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-194.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-194.el5.ia64", "product_id": "kernel-debug-0:2.6.18-194.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-194.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-194.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-194.el5.ppc64", "product": { "name": "kernel-0:2.6.18-194.el5.ppc64", "product_id": "kernel-0:2.6.18-194.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-194.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-194.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-194.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-194.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-194.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-194.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-194.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-194.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-194.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-194.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-194.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-194.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-194.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-194.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-194.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-194.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-194.el5.ppc", "product_id": "kernel-headers-0:2.6.18-194.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-194.el5.s390x", "product": { "name": "kernel-0:2.6.18-194.el5.s390x", "product_id": "kernel-0:2.6.18-194.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-194.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-194.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-194.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-194.el5.s390x", "product_id": "kernel-devel-0:2.6.18-194.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-194.el5.s390x", "product_id": "kernel-headers-0:2.6.18-194.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-194.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-194.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-194.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-194.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-194.el5.s390x", "product_id": "kernel-debug-0:2.6.18-194.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-194.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-194.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-194.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-194.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-194.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-194.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.el5.src" }, "product_reference": "kernel-0:2.6.18-194.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-194.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-doc-0:2.6.18-194.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-194.el5.noarch", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-194.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-194.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.el5.src" }, "product_reference": "kernel-0:2.6.18-194.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-194.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-doc-0:2.6.18-194.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-194.el5.noarch", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-194.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-194.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-194.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-194.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-4027", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "discovery_date": "2009-11-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "541149" } ], "notes": [ { "category": "description", "text": "Race condition in the mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (system crash) via a Delete Block ACK (aka DELBA) packet that triggers a certain state change in the absence of an aggregation session.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mac80211: fix spurious delBA handling", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3 and 4 as they do not have support for the mac80211 framework.\n\nIt did not affect the version of the Linux kernel as shipped with Red Hat Enterprise MRG as they do not include the upstream patch that introduced this vulnerability.\n\nA future update will address this flaw in Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.el5.i686", "5Client:kernel-0:2.6.18-194.el5.ia64", "5Client:kernel-0:2.6.18-194.el5.ppc64", "5Client:kernel-0:2.6.18-194.el5.s390x", "5Client:kernel-0:2.6.18-194.el5.src", "5Client:kernel-0:2.6.18-194.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.el5.i686", "5Client:kernel-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.el5.i386", "5Client:kernel-headers-0:2.6.18-194.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.el5.i686", "5Client:kernel-xen-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-0:2.6.18-194.el5.i686", "5Server:kernel-0:2.6.18-194.el5.ia64", "5Server:kernel-0:2.6.18-194.el5.ppc64", "5Server:kernel-0:2.6.18-194.el5.s390x", "5Server:kernel-0:2.6.18-194.el5.src", "5Server:kernel-0:2.6.18-194.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.el5.i686", "5Server:kernel-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.el5.i386", "5Server:kernel-headers-0:2.6.18-194.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.el5.i686", "5Server:kernel-xen-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4027" }, { "category": "external", "summary": "RHBZ#541149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=541149" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4027", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4027" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4027", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4027" } ], "release_date": "2009-11-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-29T12:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-194.el5.i686", "5Client:kernel-0:2.6.18-194.el5.ia64", "5Client:kernel-0:2.6.18-194.el5.ppc64", "5Client:kernel-0:2.6.18-194.el5.s390x", "5Client:kernel-0:2.6.18-194.el5.src", "5Client:kernel-0:2.6.18-194.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.el5.i686", "5Client:kernel-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.el5.i386", "5Client:kernel-headers-0:2.6.18-194.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.el5.i686", "5Client:kernel-xen-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-0:2.6.18-194.el5.i686", "5Server:kernel-0:2.6.18-194.el5.ia64", "5Server:kernel-0:2.6.18-194.el5.ppc64", "5Server:kernel-0:2.6.18-194.el5.s390x", "5Server:kernel-0:2.6.18-194.el5.src", "5Server:kernel-0:2.6.18-194.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.el5.i686", "5Server:kernel-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.el5.i386", "5Server:kernel-headers-0:2.6.18-194.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.el5.i686", "5Server:kernel-xen-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0178" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.el5.i686", "5Client:kernel-0:2.6.18-194.el5.ia64", "5Client:kernel-0:2.6.18-194.el5.ppc64", "5Client:kernel-0:2.6.18-194.el5.s390x", "5Client:kernel-0:2.6.18-194.el5.src", "5Client:kernel-0:2.6.18-194.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.el5.i686", "5Client:kernel-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.el5.i386", "5Client:kernel-headers-0:2.6.18-194.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.el5.i686", "5Client:kernel-xen-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-0:2.6.18-194.el5.i686", "5Server:kernel-0:2.6.18-194.el5.ia64", "5Server:kernel-0:2.6.18-194.el5.ppc64", "5Server:kernel-0:2.6.18-194.el5.s390x", "5Server:kernel-0:2.6.18-194.el5.src", "5Server:kernel-0:2.6.18-194.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.el5.i686", "5Server:kernel-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.el5.i386", "5Server:kernel-headers-0:2.6.18-194.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.el5.i686", "5Server:kernel-xen-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mac80211: fix spurious delBA handling" }, { "cve": "CVE-2009-4307", "discovery_date": "2009-12-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "547251" } ], "notes": [ { "category": "description", "text": "The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 2.6.32-git6 allows user-assisted remote attackers to cause a denial of service (divide-by-zero error and panic) via a malformed ext4 filesystem containing a super block with a large FLEX_BG group size (aka s_log_groups_per_flex value).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ext4: avoid divide by zero when trying to mount a corrupted file system", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel packages as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG do not include support for EXT4, and therefore are not affected by this issue.\n\nA future kernel update for Red Hat Enterprise Linux 5 will address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.el5.i686", "5Client:kernel-0:2.6.18-194.el5.ia64", "5Client:kernel-0:2.6.18-194.el5.ppc64", "5Client:kernel-0:2.6.18-194.el5.s390x", "5Client:kernel-0:2.6.18-194.el5.src", "5Client:kernel-0:2.6.18-194.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.el5.i686", "5Client:kernel-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.el5.i386", "5Client:kernel-headers-0:2.6.18-194.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.el5.i686", "5Client:kernel-xen-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-0:2.6.18-194.el5.i686", "5Server:kernel-0:2.6.18-194.el5.ia64", "5Server:kernel-0:2.6.18-194.el5.ppc64", "5Server:kernel-0:2.6.18-194.el5.s390x", "5Server:kernel-0:2.6.18-194.el5.src", "5Server:kernel-0:2.6.18-194.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.el5.i686", "5Server:kernel-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.el5.i386", "5Server:kernel-headers-0:2.6.18-194.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.el5.i686", "5Server:kernel-xen-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4307" }, { "category": "external", "summary": "RHBZ#547251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547251" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4307", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4307" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4307", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4307" } ], "release_date": "2009-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-29T12:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-194.el5.i686", "5Client:kernel-0:2.6.18-194.el5.ia64", "5Client:kernel-0:2.6.18-194.el5.ppc64", "5Client:kernel-0:2.6.18-194.el5.s390x", "5Client:kernel-0:2.6.18-194.el5.src", "5Client:kernel-0:2.6.18-194.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.el5.i686", "5Client:kernel-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.el5.i386", "5Client:kernel-headers-0:2.6.18-194.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.el5.i686", "5Client:kernel-xen-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-0:2.6.18-194.el5.i686", "5Server:kernel-0:2.6.18-194.el5.ia64", "5Server:kernel-0:2.6.18-194.el5.ppc64", "5Server:kernel-0:2.6.18-194.el5.s390x", "5Server:kernel-0:2.6.18-194.el5.src", "5Server:kernel-0:2.6.18-194.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.el5.i686", "5Server:kernel-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.el5.i386", "5Server:kernel-headers-0:2.6.18-194.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.el5.i686", "5Server:kernel-xen-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0178" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.el5.i686", "5Client:kernel-0:2.6.18-194.el5.ia64", "5Client:kernel-0:2.6.18-194.el5.ppc64", "5Client:kernel-0:2.6.18-194.el5.s390x", "5Client:kernel-0:2.6.18-194.el5.src", "5Client:kernel-0:2.6.18-194.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.el5.i686", "5Client:kernel-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.el5.i386", "5Client:kernel-headers-0:2.6.18-194.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.el5.i686", "5Client:kernel-xen-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-0:2.6.18-194.el5.i686", "5Server:kernel-0:2.6.18-194.el5.ia64", "5Server:kernel-0:2.6.18-194.el5.ppc64", "5Server:kernel-0:2.6.18-194.el5.s390x", "5Server:kernel-0:2.6.18-194.el5.src", "5Server:kernel-0:2.6.18-194.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.el5.i686", "5Server:kernel-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.el5.i386", "5Server:kernel-headers-0:2.6.18-194.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.el5.i686", "5Server:kernel-xen-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: ext4: avoid divide by zero when trying to mount a corrupted file system" }, { "cve": "CVE-2010-0727", "discovery_date": "2010-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "570863" } ], "notes": [ { "category": "description", "text": "The gfs2_lock function in the Linux kernel before 2.6.34-rc1-next-20100312, and the gfs_lock function in the Linux kernel on Red Hat Enterprise Linux (RHEL) 5 and 6, does not properly remove POSIX locks on files that are setgid without group-execute permission, which allows local users to cause a denial of service (BUG and system crash) by locking a file on a (1) GFS or (2) GFS2 filesystem, and then changing this file\u0027s permissions.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: bug in GFS/GFS2 locking code leads to dos", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise MRG, as it did not include support for the GFS and GFS2 file systems.\n\nFor the GFS issue, it was addressed in Red Hat Enterprise Linux 3 in the gfs package, 4 in the GFS-kernel package, and 5 in the gfs-kmod package, via RHSA-2010:9493, RHSA-2010:9494, RHSA-2010:0291 respectively.\n\nFor the GFS2 issue, it was addressed in Red Hat Enterprise Linux 5 in the kernel package via RHSA-2010:0178.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.el5.i686", "5Client:kernel-0:2.6.18-194.el5.ia64", "5Client:kernel-0:2.6.18-194.el5.ppc64", "5Client:kernel-0:2.6.18-194.el5.s390x", "5Client:kernel-0:2.6.18-194.el5.src", "5Client:kernel-0:2.6.18-194.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.el5.i686", "5Client:kernel-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.el5.i386", "5Client:kernel-headers-0:2.6.18-194.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.el5.i686", "5Client:kernel-xen-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-0:2.6.18-194.el5.i686", "5Server:kernel-0:2.6.18-194.el5.ia64", "5Server:kernel-0:2.6.18-194.el5.ppc64", "5Server:kernel-0:2.6.18-194.el5.s390x", "5Server:kernel-0:2.6.18-194.el5.src", "5Server:kernel-0:2.6.18-194.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.el5.i686", "5Server:kernel-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.el5.i386", "5Server:kernel-headers-0:2.6.18-194.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.el5.i686", "5Server:kernel-xen-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0727" }, { "category": "external", "summary": "RHBZ#570863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0727", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0727" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0727", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0727" } ], "release_date": "2010-03-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-29T12:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-194.el5.i686", "5Client:kernel-0:2.6.18-194.el5.ia64", "5Client:kernel-0:2.6.18-194.el5.ppc64", "5Client:kernel-0:2.6.18-194.el5.s390x", "5Client:kernel-0:2.6.18-194.el5.src", "5Client:kernel-0:2.6.18-194.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.el5.i686", "5Client:kernel-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.el5.i386", "5Client:kernel-headers-0:2.6.18-194.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.el5.i686", "5Client:kernel-xen-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-0:2.6.18-194.el5.i686", "5Server:kernel-0:2.6.18-194.el5.ia64", "5Server:kernel-0:2.6.18-194.el5.ppc64", "5Server:kernel-0:2.6.18-194.el5.s390x", "5Server:kernel-0:2.6.18-194.el5.src", "5Server:kernel-0:2.6.18-194.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.el5.i686", "5Server:kernel-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.el5.i386", "5Server:kernel-headers-0:2.6.18-194.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.el5.i686", "5Server:kernel-xen-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0178" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.el5.i686", "5Client:kernel-0:2.6.18-194.el5.ia64", "5Client:kernel-0:2.6.18-194.el5.ppc64", "5Client:kernel-0:2.6.18-194.el5.s390x", "5Client:kernel-0:2.6.18-194.el5.src", "5Client:kernel-0:2.6.18-194.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.el5.i686", "5Client:kernel-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.el5.i386", "5Client:kernel-headers-0:2.6.18-194.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.el5.i686", "5Client:kernel-xen-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-0:2.6.18-194.el5.i686", "5Server:kernel-0:2.6.18-194.el5.ia64", "5Server:kernel-0:2.6.18-194.el5.ppc64", "5Server:kernel-0:2.6.18-194.el5.s390x", "5Server:kernel-0:2.6.18-194.el5.src", "5Server:kernel-0:2.6.18-194.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.el5.i686", "5Server:kernel-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.el5.i386", "5Server:kernel-headers-0:2.6.18-194.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.el5.i686", "5Server:kernel-xen-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: bug in GFS/GFS2 locking code leads to dos" }, { "cve": "CVE-2010-1188", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "577711" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipv6: skb is unexpectedly freed", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise MRG, as it was fixed since version v2.6.20-rc6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.el5.i686", "5Client:kernel-0:2.6.18-194.el5.ia64", "5Client:kernel-0:2.6.18-194.el5.ppc64", "5Client:kernel-0:2.6.18-194.el5.s390x", "5Client:kernel-0:2.6.18-194.el5.src", "5Client:kernel-0:2.6.18-194.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.el5.i686", "5Client:kernel-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.el5.i386", "5Client:kernel-headers-0:2.6.18-194.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.el5.i686", "5Client:kernel-xen-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-0:2.6.18-194.el5.i686", "5Server:kernel-0:2.6.18-194.el5.ia64", "5Server:kernel-0:2.6.18-194.el5.ppc64", "5Server:kernel-0:2.6.18-194.el5.s390x", "5Server:kernel-0:2.6.18-194.el5.src", "5Server:kernel-0:2.6.18-194.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.el5.i686", "5Server:kernel-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.el5.i386", "5Server:kernel-headers-0:2.6.18-194.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.el5.i686", "5Server:kernel-xen-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1188" }, { "category": "external", "summary": "RHBZ#577711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1188", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1188" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188" } ], "release_date": "2007-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-29T12:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-194.el5.i686", "5Client:kernel-0:2.6.18-194.el5.ia64", "5Client:kernel-0:2.6.18-194.el5.ppc64", "5Client:kernel-0:2.6.18-194.el5.s390x", "5Client:kernel-0:2.6.18-194.el5.src", "5Client:kernel-0:2.6.18-194.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.el5.i686", "5Client:kernel-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.el5.i386", "5Client:kernel-headers-0:2.6.18-194.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.el5.i686", "5Client:kernel-xen-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-0:2.6.18-194.el5.i686", "5Server:kernel-0:2.6.18-194.el5.ia64", "5Server:kernel-0:2.6.18-194.el5.ppc64", "5Server:kernel-0:2.6.18-194.el5.s390x", "5Server:kernel-0:2.6.18-194.el5.src", "5Server:kernel-0:2.6.18-194.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.el5.i686", "5Server:kernel-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.el5.i386", "5Server:kernel-headers-0:2.6.18-194.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.el5.i686", "5Server:kernel-xen-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0178" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.el5.i686", "5Client:kernel-0:2.6.18-194.el5.ia64", "5Client:kernel-0:2.6.18-194.el5.ppc64", "5Client:kernel-0:2.6.18-194.el5.s390x", "5Client:kernel-0:2.6.18-194.el5.src", "5Client:kernel-0:2.6.18-194.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.i686", "5Client:kernel-debug-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.el5.i686", "5Client:kernel-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.el5.i386", "5Client:kernel-headers-0:2.6.18-194.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.el5.i686", "5Client:kernel-xen-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-0:2.6.18-194.el5.i686", "5Server:kernel-0:2.6.18-194.el5.ia64", "5Server:kernel-0:2.6.18-194.el5.ppc64", "5Server:kernel-0:2.6.18-194.el5.s390x", "5Server:kernel-0:2.6.18-194.el5.src", "5Server:kernel-0:2.6.18-194.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.i686", "5Server:kernel-debug-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.el5.i686", "5Server:kernel-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.el5.i386", "5Server:kernel-headers-0:2.6.18-194.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.el5.i686", "5Server:kernel-xen-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ipv6: skb is unexpectedly freed" } ] }
rhsa-2010_0380
Vulnerability from csaf_redhat
Published
2010-04-27 12:46
Modified
2024-11-05 17:15
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.4 Extended Update Support.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security fixes:
* a race condition was found in the mac80211 implementation, a framework
used for writing drivers for wireless devices. An attacker could trigger
this flaw by sending a Delete Block ACK (DELBA) packet to a target system,
resulting in a remote denial of service. Note: This issue only affected
users on 802.11n networks, and that also use the iwlagn driver with Intel
wireless hardware. (CVE-2009-4027, Important)
* a use-after-free flaw was found in the tcp_rcv_state_process() function
in the Linux kernel TCP/IP protocol suite implementation. If a system using
IPv6 had the IPV6_RECVPKTINFO option set on a listening socket, a remote
attacker could send an IPv6 packet to that system, causing a kernel panic
(denial of service). (CVE-2010-1188, Important)
* a flaw was found in the gfs2_lock() implementation. The GFS2 locking code
could skip the lock operation for files that have the S_ISGID bit
(set-group-ID on execution) in their mode set. A local, unprivileged user
on a system that has a GFS2 file system mounted could use this flaw to
cause a kernel panic (denial of service). (CVE-2010-0727, Moderate)
* a divide-by-zero flaw was found in the ext4 file system code. A local
attacker could use this flaw to cause a denial of service by mounting a
specially-crafted ext4 file system. (CVE-2009-4307, Low)
Bug fixes:
* if a program that calls posix_fadvise() were compiled on x86, and then
run on a 64-bit system, that program could experience various problems,
including performance issues and the call to posix_fadvise() failing,
causing the program to not run as expected or even abort. With this update,
when such programs attempt to call posix_fadvise() on 64-bit systems,
sys32_fadvise64() is called instead, which resolves this issue. This update
also fixes other 32-bit system calls that were mistakenly called on 64-bit
systems (including systems running the kernel-xen kernel). (BZ#569597)
* on some systems able to set a P-State limit via the BIOS, it was not
possible to set the limit to a higher frequency if the system was rebooted
while a low limit was set:
"/sys/devices/system/cpu/cpu[x]/cpufreq/scaling_max_freq" would retain the
low limit in these situations. With this update, limits are correctly set,
even after being changed after a system reboot. (BZ#569727)
* certain Intel ICH hardware (using the e1000e driver) has an NFS filtering
capability that did not work as expected, causing memory corruption, which
could lead to kernel panics, or other unexpected behavior. In a reported
case, a panic occurred when running NFS connection tests. This update
resolves this issue by disabling the filtering capability. (BZ#569797)
* if "open(/proc/[PID]/[xxxx])" was called at the same time the process was
exiting, the call would fail with an EINVAL error (an incorrect error for
this situation). With this update, the correct error, ENOENT, is returned
in this situation. (BZ#571362)
* multiqueue is used for transmitting data, but a single queue transmit
ON/OFF scheme was used. This led to a race condition on systems with the
bnx2x driver in situations where one queue became full, but not stopped,
and the other queue enabled transmission. With this update, only a single
queue is used. (BZ#576951)
* the "/proc/sys/vm/mmap_min_addr" tunable helps prevent unprivileged
users from creating new memory mappings below the minimum address. The
sysctl value for mmap_min_addr could be changed by a process or user that
has an effective user ID (euid) of 0, even if the process or user does not
have the CAP_SYS_RAWIO capability. This update adds a capability check for
the CAP_SYS_RAWIO capability before allowing the mmap_min_addr value to be
changed. (BZ#577206)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.4 Extended Update Support.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* a race condition was found in the mac80211 implementation, a framework\nused for writing drivers for wireless devices. An attacker could trigger\nthis flaw by sending a Delete Block ACK (DELBA) packet to a target system,\nresulting in a remote denial of service. Note: This issue only affected\nusers on 802.11n networks, and that also use the iwlagn driver with Intel\nwireless hardware. (CVE-2009-4027, Important)\n\n* a use-after-free flaw was found in the tcp_rcv_state_process() function\nin the Linux kernel TCP/IP protocol suite implementation. If a system using\nIPv6 had the IPV6_RECVPKTINFO option set on a listening socket, a remote\nattacker could send an IPv6 packet to that system, causing a kernel panic\n(denial of service). (CVE-2010-1188, Important)\n\n* a flaw was found in the gfs2_lock() implementation. The GFS2 locking code\ncould skip the lock operation for files that have the S_ISGID bit\n(set-group-ID on execution) in their mode set. A local, unprivileged user\non a system that has a GFS2 file system mounted could use this flaw to\ncause a kernel panic (denial of service). (CVE-2010-0727, Moderate)\n\n* a divide-by-zero flaw was found in the ext4 file system code. A local\nattacker could use this flaw to cause a denial of service by mounting a\nspecially-crafted ext4 file system. (CVE-2009-4307, Low)\n\nBug fixes:\n\n* if a program that calls posix_fadvise() were compiled on x86, and then\nrun on a 64-bit system, that program could experience various problems,\nincluding performance issues and the call to posix_fadvise() failing,\ncausing the program to not run as expected or even abort. With this update,\nwhen such programs attempt to call posix_fadvise() on 64-bit systems,\nsys32_fadvise64() is called instead, which resolves this issue. This update\nalso fixes other 32-bit system calls that were mistakenly called on 64-bit\nsystems (including systems running the kernel-xen kernel). (BZ#569597)\n\n* on some systems able to set a P-State limit via the BIOS, it was not\npossible to set the limit to a higher frequency if the system was rebooted\nwhile a low limit was set:\n\"/sys/devices/system/cpu/cpu[x]/cpufreq/scaling_max_freq\" would retain the\nlow limit in these situations. With this update, limits are correctly set,\neven after being changed after a system reboot. (BZ#569727)\n\n* certain Intel ICH hardware (using the e1000e driver) has an NFS filtering\ncapability that did not work as expected, causing memory corruption, which\ncould lead to kernel panics, or other unexpected behavior. In a reported\ncase, a panic occurred when running NFS connection tests. This update\nresolves this issue by disabling the filtering capability. (BZ#569797)\n\n* if \"open(/proc/[PID]/[xxxx])\" was called at the same time the process was\nexiting, the call would fail with an EINVAL error (an incorrect error for\nthis situation). With this update, the correct error, ENOENT, is returned\nin this situation. (BZ#571362)\n\n* multiqueue is used for transmitting data, but a single queue transmit\nON/OFF scheme was used. This led to a race condition on systems with the\nbnx2x driver in situations where one queue became full, but not stopped,\nand the other queue enabled transmission. With this update, only a single\nqueue is used. (BZ#576951)\n\n* the \"/proc/sys/vm/mmap_min_addr\" tunable helps prevent unprivileged\nusers from creating new memory mappings below the minimum address. The\nsysctl value for mmap_min_addr could be changed by a process or user that\nhas an effective user ID (euid) of 0, even if the process or user does not\nhave the CAP_SYS_RAWIO capability. This update adds a capability check for\nthe CAP_SYS_RAWIO capability before allowing the mmap_min_addr value to be\nchanged. (BZ#577206)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0380", "url": "https://access.redhat.com/errata/RHSA-2010:0380" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "541149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=541149" }, { "category": "external", "summary": "547251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547251" }, { "category": "external", "summary": "569597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569597" }, { "category": "external", "summary": "569727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569727" }, { "category": "external", "summary": "569797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569797" }, { "category": "external", "summary": "570863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570863" }, { "category": "external", "summary": "571362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=571362" }, { "category": "external", "summary": "576951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=576951" }, { "category": "external", "summary": "577206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577206" }, { "category": "external", "summary": "577711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0380.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-05T17:15:48+00:00", "generator": { "date": "2024-11-05T17:15:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2010:0380", "initial_release_date": "2010-04-27T12:46:00+00:00", "revision_history": [ { "date": "2010-04-27T12:46:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-04-27T08:46:01+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T17:15:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux EUS (v. 5.4 server)", "product": { "name": "Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:5.4" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-164.17.1.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-164.17.1.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-164.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-164.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-164.17.1.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-164.17.1.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-164.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-164.17.1.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-164.17.1.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-164.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-164.17.1.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-164.17.1.el5.i686", "product_id": "kernel-debug-0:2.6.18-164.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-164.17.1.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-164.17.1.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-164.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-164.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-164.17.1.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-164.17.1.el5.i686", "product_id": "kernel-PAE-0:2.6.18-164.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-164.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-164.17.1.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-164.17.1.el5.i686", "product_id": "kernel-devel-0:2.6.18-164.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-164.17.1.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-164.17.1.el5.i686", "product_id": "kernel-xen-0:2.6.18-164.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-164.17.1.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-164.17.1.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-164.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.17.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-164.17.1.el5.i686", "product": { "name": "kernel-0:2.6.18-164.17.1.el5.i686", "product_id": "kernel-0:2.6.18-164.17.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.17.1.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.17.1.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-164.17.1.el5.i386", "product_id": "kernel-headers-0:2.6.18-164.17.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.17.1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-164.17.1.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-164.17.1.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-164.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.17.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.17.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-164.17.1.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-164.17.1.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-164.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.17.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.17.1.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-164.17.1.el5.ia64", "product_id": "kernel-headers-0:2.6.18-164.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.17.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-164.17.1.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-164.17.1.el5.ia64", "product_id": "kernel-debug-0:2.6.18-164.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.17.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-164.17.1.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-164.17.1.el5.ia64", "product_id": "kernel-devel-0:2.6.18-164.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.17.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.17.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.17.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-164.17.1.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-164.17.1.el5.ia64", "product_id": "kernel-xen-0:2.6.18-164.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.17.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-164.17.1.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-164.17.1.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-164.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.17.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-164.17.1.el5.ia64", "product": { "name": "kernel-0:2.6.18-164.17.1.el5.ia64", "product_id": "kernel-0:2.6.18-164.17.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.17.1.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.17.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.17.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.17.1.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-164.17.1.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-164.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.17.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-164.17.1.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-164.17.1.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-164.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-164.17.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-164.17.1.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-164.17.1.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-164.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.17.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-164.17.1.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-164.17.1.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-164.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.17.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.17.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-164.17.1.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-164.17.1.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-164.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.17.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-164.17.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-164.17.1.el5.ppc64", "product": { "name": "kernel-0:2.6.18-164.17.1.el5.ppc64", "product_id": "kernel-0:2.6.18-164.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.17.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-164.17.1.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-164.17.1.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-164.17.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-164.17.1.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.17.1.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-164.17.1.el5.ppc", "product_id": "kernel-headers-0:2.6.18-164.17.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.17.1.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-164.17.1.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-164.17.1.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-164.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.17.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.17.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.17.1.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-164.17.1.el5.s390x", "product_id": "kernel-headers-0:2.6.18-164.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.17.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-164.17.1.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-164.17.1.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-164.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-164.17.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-164.17.1.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-164.17.1.el5.s390x", "product_id": "kernel-debug-0:2.6.18-164.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.17.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-164.17.1.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-164.17.1.el5.s390x", "product_id": "kernel-devel-0:2.6.18-164.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.17.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.17.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-164.17.1.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-164.17.1.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-164.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.17.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-164.17.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-164.17.1.el5.s390x", "product": { "name": "kernel-0:2.6.18-164.17.1.el5.s390x", "product_id": "kernel-0:2.6.18-164.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.17.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-164.17.1.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-164.17.1.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-164.17.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-164.17.1.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.17.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.17.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-164.17.1.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-164.17.1.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-164.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.17.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.17.1.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-164.17.1.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-164.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.17.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-164.17.1.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-164.17.1.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-164.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.17.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-164.17.1.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-164.17.1.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-164.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.17.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.17.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.17.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-164.17.1.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-164.17.1.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-164.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.17.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-164.17.1.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-164.17.1.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-164.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.17.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-164.17.1.el5.x86_64", "product": { "name": "kernel-0:2.6.18-164.17.1.el5.x86_64", "product_id": "kernel-0:2.6.18-164.17.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.17.1.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-164.17.1.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-164.17.1.el5.noarch", "product_id": "kernel-doc-0:2.6.18-164.17.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-164.17.1.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-164.17.1.el5.src", "product": { "name": "kernel-0:2.6.18-164.17.1.el5.src", "product_id": "kernel-0:2.6.18-164.17.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.17.1.el5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-164.17.1.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ia64" }, "product_reference": "kernel-0:2.6.18-164.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-164.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.s390x" }, "product_reference": "kernel-0:2.6.18-164.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.17.1.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.src" }, "product_reference": "kernel-0:2.6.18-164.17.1.el5.src", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-164.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-164.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-PAE-0:2.6.18-164.17.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-164.17.1.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-164.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-PAE-debuginfo-0:2.6.18-164.17.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-164.17.1.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-164.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-PAE-devel-0:2.6.18-164.17.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-164.17.1.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-164.17.1.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-164.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-164.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-164.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-164.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.17.1.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.17.1.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-164.17.1.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-164.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-164.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-164.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-164.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-164.17.1.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-doc-0:2.6.18-164.17.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-164.17.1.el5.noarch", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.17.1.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-164.17.1.el5.i386", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-164.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.17.1.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-164.17.1.el5.ppc", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-164.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-164.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-164.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-164.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-164.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-164.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-164.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-164.17.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-164.17.1.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-164.17.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-164.17.1.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-164.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-164.17.1.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-164.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-164.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-164.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-164.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-164.17.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-164.17.1.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-164.17.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-164.17.1.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-164.17.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-164.17.1.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-4027", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "discovery_date": "2009-11-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "541149" } ], "notes": [ { "category": "description", "text": "Race condition in the mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (system crash) via a Delete Block ACK (aka DELBA) packet that triggers a certain state change in the absence of an aggregation session.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mac80211: fix spurious delBA handling", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3 and 4 as they do not have support for the mac80211 framework.\n\nIt did not affect the version of the Linux kernel as shipped with Red Hat Enterprise MRG as they do not include the upstream patch that introduced this vulnerability.\n\nA future update will address this flaw in Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.src", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-PAE-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-doc-0:2.6.18-164.17.1.el5.noarch", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.i386", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4027" }, { "category": "external", "summary": "RHBZ#541149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=541149" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4027", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4027" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4027", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4027" } ], "release_date": "2009-11-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-04-27T12:46:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.src", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-PAE-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-doc-0:2.6.18-164.17.1.el5.noarch", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.i386", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0380" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.src", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-PAE-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-doc-0:2.6.18-164.17.1.el5.noarch", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.i386", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mac80211: fix spurious delBA handling" }, { "cve": "CVE-2009-4307", "discovery_date": "2009-12-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "547251" } ], "notes": [ { "category": "description", "text": "The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 2.6.32-git6 allows user-assisted remote attackers to cause a denial of service (divide-by-zero error and panic) via a malformed ext4 filesystem containing a super block with a large FLEX_BG group size (aka s_log_groups_per_flex value).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ext4: avoid divide by zero when trying to mount a corrupted file system", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel packages as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG do not include support for EXT4, and therefore are not affected by this issue.\n\nA future kernel update for Red Hat Enterprise Linux 5 will address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.src", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-PAE-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-doc-0:2.6.18-164.17.1.el5.noarch", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.i386", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4307" }, { "category": "external", "summary": "RHBZ#547251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547251" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4307", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4307" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4307", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4307" } ], "release_date": "2009-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-04-27T12:46:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.src", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-PAE-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-doc-0:2.6.18-164.17.1.el5.noarch", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.i386", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0380" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.src", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-PAE-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-doc-0:2.6.18-164.17.1.el5.noarch", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.i386", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: ext4: avoid divide by zero when trying to mount a corrupted file system" }, { "cve": "CVE-2010-0727", "discovery_date": "2010-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "570863" } ], "notes": [ { "category": "description", "text": "The gfs2_lock function in the Linux kernel before 2.6.34-rc1-next-20100312, and the gfs_lock function in the Linux kernel on Red Hat Enterprise Linux (RHEL) 5 and 6, does not properly remove POSIX locks on files that are setgid without group-execute permission, which allows local users to cause a denial of service (BUG and system crash) by locking a file on a (1) GFS or (2) GFS2 filesystem, and then changing this file\u0027s permissions.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: bug in GFS/GFS2 locking code leads to dos", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise MRG, as it did not include support for the GFS and GFS2 file systems.\n\nFor the GFS issue, it was addressed in Red Hat Enterprise Linux 3 in the gfs package, 4 in the GFS-kernel package, and 5 in the gfs-kmod package, via RHSA-2010:9493, RHSA-2010:9494, RHSA-2010:0291 respectively.\n\nFor the GFS2 issue, it was addressed in Red Hat Enterprise Linux 5 in the kernel package via RHSA-2010:0178.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.src", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-PAE-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-doc-0:2.6.18-164.17.1.el5.noarch", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.i386", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0727" }, { "category": "external", "summary": "RHBZ#570863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0727", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0727" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0727", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0727" } ], "release_date": "2010-03-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-04-27T12:46:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.src", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-PAE-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-doc-0:2.6.18-164.17.1.el5.noarch", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.i386", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0380" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.src", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-PAE-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-doc-0:2.6.18-164.17.1.el5.noarch", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.i386", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: bug in GFS/GFS2 locking code leads to dos" }, { "cve": "CVE-2010-1188", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "577711" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipv6: skb is unexpectedly freed", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise MRG, as it was fixed since version v2.6.20-rc6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.src", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-PAE-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-doc-0:2.6.18-164.17.1.el5.noarch", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.i386", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1188" }, { "category": "external", "summary": "RHBZ#577711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1188", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1188" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188" } ], "release_date": "2007-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-04-27T12:46:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.src", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-PAE-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-doc-0:2.6.18-164.17.1.el5.noarch", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.i386", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0380" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.src", "5Server-5.4.Z:kernel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-PAE-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-PAE-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-doc-0:2.6.18-164.17.1.el5.noarch", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.i386", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.ppc64", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.17.1.el5.s390x", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.17.1.el5.x86_64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.i686", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.ia64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.17.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ipv6: skb is unexpectedly freed" } ] }
ghsa-c595-prjf-55w3
Vulnerability from github
Published
2022-05-02 06:19
Modified
2022-05-02 06:19
Details
Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.
{ "affected": [], "aliases": [ "CVE-2010-1188" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-03-31T18:00:00Z", "severity": "HIGH" }, "details": "Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.", "id": "GHSA-c595-prjf-55w3", "modified": "2022-05-02T06:19:58Z", "published": "2022-05-02T06:19:58Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9878" }, { "type": "WEB", "url": "http://git.kernel.org/linus/fb7e2399ec17f1004c0e0ccfd17439f8759ede01" }, { "type": "WEB", "url": "http://secunia.com/advisories/39652" }, { "type": "WEB", "url": "http://support.avaya.com/css/P8/documents/100090459" }, { "type": "WEB", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2010/03/29/1" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0380.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0394.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0424.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0439.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/39016" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1023992" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2010-1188
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2010-1188", "description": "Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.", "id": "GSD-2010-1188", "references": [ "https://www.suse.com/security/cve/CVE-2010-1188.html", "https://access.redhat.com/errata/RHSA-2010:0882", "https://access.redhat.com/errata/RHSA-2010:0439", "https://access.redhat.com/errata/RHSA-2010:0424", "https://access.redhat.com/errata/RHSA-2010:0394", "https://access.redhat.com/errata/RHSA-2010:0380", "https://access.redhat.com/errata/RHSA-2010:0178", "https://linux.oracle.com/cve/CVE-2010-1188.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2010-1188" ], "details": "Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.", "id": "GSD-2010-1188", "modified": "2023-12-13T01:21:33.078209Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-1188", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1023992", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1023992" }, { "name": "RHSA-2010:0380", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0380.html" }, { "name": "oval:org.mitre.oval:def:9878", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9878" }, { "name": "RHSA-2010:0394", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0394.html" }, { "name": "http://support.avaya.com/css/P8/documents/100090459", "refsource": "CONFIRM", "url": "http://support.avaya.com/css/P8/documents/100090459" }, { "name": "RHSA-2010:0882", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html" }, { "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20", "refsource": "CONFIRM", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20" }, { "name": "[oss-security] 20100329 CVE request: kernel: ipv6: skb is unexpectedly freed (remote DoS)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/03/29/1" }, { "name": "39652", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39652" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "name": "http://git.kernel.org/linus/fb7e2399ec17f1004c0e0ccfd17439f8759ede01", "refsource": "CONFIRM", "url": "http://git.kernel.org/linus/fb7e2399ec17f1004c0e0ccfd17439f8759ede01" }, { "name": "RHSA-2010:0439", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0439.html" }, { "name": "39016", "refsource": "BID", "url": "http://www.securityfocus.com/bid/39016" }, { "name": "RHSA-2010:0424", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0424.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-1188" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "http://git.kernel.org/linus/fb7e2399ec17f1004c0e0ccfd17439f8759ede01", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://git.kernel.org/linus/fb7e2399ec17f1004c0e0ccfd17439f8759ede01" }, { "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20", "refsource": "CONFIRM", "tags": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20" }, { "name": "[oss-security] 20100329 CVE request: kernel: ipv6: skb is unexpectedly freed (remote DoS)", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2010/03/29/1" }, { "name": "RHSA-2010:0424", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0424.html" }, { "name": "RHSA-2010:0394", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0394.html" }, { "name": "RHSA-2010:0380", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0380.html" }, { "name": "39652", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/39652" }, { "name": "1023992", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id?1023992" }, { "name": "RHSA-2010:0439", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0439.html" }, { "name": "39016", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/39016" }, { "name": "http://support.avaya.com/css/P8/documents/100090459", "refsource": "CONFIRM", "tags": [], "url": "http://support.avaya.com/css/P8/documents/100090459" }, { "name": "RHSA-2010:0882", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "name": "oval:org.mitre.oval:def:9878", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9878" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2017-09-19T01:30Z", "publishedDate": "2010-03-31T18:00Z" } } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.