rhsa-2011_0429
Vulnerability from csaf_redhat
Published
2011-04-12 18:15
Modified
2024-09-15 19:02
Summary
Red Hat Security Advisory: kernel security and bug fix update

Notes

Topic
Updated kernel packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issues: * A missing boundary check was found in the dvb_ca_ioctl() function in the Linux kernel's av7110 module. On systems that use old DVB cards that require the av7110 module, a local, unprivileged user could use this flaw to cause a denial of service or escalate their privileges. (CVE-2011-0521, Important) * An inconsistency was found in the interaction between the Linux kernel's method for allocating NFSv4 (Network File System version 4) ACL data and the method by which it was freed. This inconsistency led to a kernel panic which could be triggered by a local, unprivileged user with files owned by said user on an NFSv4 share. (CVE-2011-1090, Moderate) * A NULL pointer dereference flaw was found in the Generic Receive Offload (GRO) functionality in the Linux kernel's networking implementation. If both GRO and promiscuous mode were enabled on an interface in a virtual LAN (VLAN), it could result in a denial of service when a malformed VLAN frame is received on that interface. (CVE-2011-1478, Moderate) * A missing security check in the Linux kernel's implementation of the install_special_mapping() function could allow a local, unprivileged user to bypass the mmap_min_addr protection mechanism. (CVE-2010-4346, Low) * An information leak was found in the Linux kernel's task_show_regs() implementation. On IBM S/390 systems, a local, unprivileged user could use this flaw to read /proc/[PID]/status files, allowing them to discover the CPU register values of processes. (CVE-2011-0710, Low) * A missing validation check was found in the Linux kernel's mac_partition() implementation, used for supporting file systems created on Mac OS operating systems. A local attacker could use this flaw to cause a denial of service by mounting a disk that contains specially-crafted partitions. (CVE-2011-1010, Low) Red Hat would like to thank Ryan Sweat for reporting CVE-2011-1478; Tavis Ormandy for reporting CVE-2010-4346; and Timo Warns for reporting CVE-2011-1010. This update also fixes several bugs. Documentation for these bug fixes will be available shortly from the Technical Notes document linked to in the References section. Users should upgrade to these updated packages, which contain backported patches to correct these issues, and fix the bugs noted in the Technical Notes. The system must be rebooted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* A missing boundary check was found in the dvb_ca_ioctl() function in the\nLinux kernel\u0027s av7110 module. On systems that use old DVB cards that\nrequire the av7110 module, a local, unprivileged user could use this flaw\nto cause a denial of service or escalate their privileges. (CVE-2011-0521,\nImportant)\n\n* An inconsistency was found in the interaction between the Linux kernel\u0027s\nmethod for allocating NFSv4 (Network File System version 4) ACL data and\nthe method by which it was freed. This inconsistency led to a kernel panic\nwhich could be triggered by a local, unprivileged user with files owned by\nsaid user on an NFSv4 share. (CVE-2011-1090, Moderate)\n\n* A NULL pointer dereference flaw was found in the Generic Receive Offload\n(GRO) functionality in the Linux kernel\u0027s networking implementation. If\nboth GRO and promiscuous mode were enabled on an interface in a virtual LAN\n(VLAN), it could result in a denial of service when a malformed VLAN frame\nis received on that interface. (CVE-2011-1478, Moderate)\n\n* A missing security check in the Linux kernel\u0027s implementation of the\ninstall_special_mapping() function could allow a local, unprivileged user\nto bypass the mmap_min_addr protection mechanism. (CVE-2010-4346, Low)\n\n* An information leak was found in the Linux kernel\u0027s task_show_regs()\nimplementation. On IBM S/390 systems, a local, unprivileged user could use\nthis flaw to read /proc/[PID]/status files, allowing them to discover the\nCPU register values of processes. (CVE-2011-0710, Low)\n\n* A missing validation check was found in the Linux kernel\u0027s\nmac_partition() implementation, used for supporting file systems created\non Mac OS operating systems. A local attacker could use this flaw to cause\na denial of service by mounting a disk that contains specially-crafted\npartitions. (CVE-2011-1010, Low)\n\nRed Hat would like to thank Ryan Sweat for reporting CVE-2011-1478; Tavis\nOrmandy for reporting CVE-2010-4346; and Timo Warns for reporting\nCVE-2011-1010.\n\nThis update also fixes several bugs. Documentation for these bug fixes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues, and fix the bugs noted in the Technical\nNotes. The system must be rebooted for this update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2011:0429",
        "url": "https://access.redhat.com/errata/RHSA-2011:0429"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.6_Technical_Notes/kernel.html#RHSA-2011-0429",
        "url": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.6_Technical_Notes/kernel.html#RHSA-2011-0429"
      },
      {
        "category": "external",
        "summary": "662189",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=662189"
      },
      {
        "category": "external",
        "summary": "672398",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672398"
      },
      {
        "category": "external",
        "summary": "675664",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675664"
      },
      {
        "category": "external",
        "summary": "675909",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675909"
      },
      {
        "category": "external",
        "summary": "677173",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677173"
      },
      {
        "category": "external",
        "summary": "677850",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677850"
      },
      {
        "category": "external",
        "summary": "679282",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=679282"
      },
      {
        "category": "external",
        "summary": "680043",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680043"
      },
      {
        "category": "external",
        "summary": "680350",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680350"
      },
      {
        "category": "external",
        "summary": "681795",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681795"
      },
      {
        "category": "external",
        "summary": "682641",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=682641"
      },
      {
        "category": "external",
        "summary": "682673",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=682673"
      },
      {
        "category": "external",
        "summary": "683443",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=683443"
      },
      {
        "category": "external",
        "summary": "684128",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=684128"
      },
      {
        "category": "external",
        "summary": "691270",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=691270"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2011/rhsa-2011_0429.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2024-09-15T19:02:46+00:00",
      "generator": {
        "date": "2024-09-15T19:02:46+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "3.33.3"
        }
      },
      "id": "RHSA-2011:0429",
      "initial_release_date": "2011-04-12T18:15:00+00:00",
      "revision_history": [
        {
          "date": "2011-04-12T18:15:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2011-04-12T14:19:57+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-09-15T19:02:46+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5.6.z server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5.6.z server)",
                  "product_id": "5Server-5.6.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-238.9.1.el5.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.18-238.9.1.el5.i686",
                  "product_id": "kernel-debug-0:2.6.18-238.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
                  "product_id": "kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-238.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-238.9.1.el5.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.18-238.9.1.el5.i686",
                  "product_id": "kernel-devel-0:2.6.18-238.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-238.9.1.el5.i686",
                "product": {
                  "name": "kernel-0:2.6.18-238.9.1.el5.i686",
                  "product_id": "kernel-0:2.6.18-238.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-238.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
                  "product_id": "kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
                  "product_id": "kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-238.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
                  "product_id": "kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-238.9.1.el5.i686",
                "product": {
                  "name": "kernel-xen-0:2.6.18-238.9.1.el5.i686",
                  "product_id": "kernel-xen-0:2.6.18-238.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
                  "product_id": "kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-0:2.6.18-238.9.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-0:2.6.18-238.9.1.el5.i686",
                  "product_id": "kernel-PAE-0:2.6.18-238.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-238.9.1.el5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-238.9.1.el5.i386",
                "product": {
                  "name": "kernel-headers-0:2.6.18-238.9.1.el5.i386",
                  "product_id": "kernel-headers-0:2.6.18-238.9.1.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.9.1.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-238.9.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-238.9.1.el5.ia64",
                  "product_id": "kernel-debug-0:2.6.18-238.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-238.9.1.el5.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-238.9.1.el5.ia64",
                  "product_id": "kernel-devel-0:2.6.18-238.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-238.9.1.el5.ia64",
                "product": {
                  "name": "kernel-0:2.6.18-238.9.1.el5.ia64",
                  "product_id": "kernel-0:2.6.18-238.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-238.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
                  "product_id": "kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
                  "product_id": "kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-238.9.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-238.9.1.el5.ia64",
                  "product_id": "kernel-xen-0:2.6.18-238.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-238.9.1.el5.ia64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-238.9.1.el5.ia64",
                  "product_id": "kernel-headers-0:2.6.18-238.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.9.1.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
                  "product_id": "kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-238.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
                  "product_id": "kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-238.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-0:2.6.18-238.9.1.el5.ppc64",
                  "product_id": "kernel-0:2.6.18-238.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-238.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
                  "product_id": "kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-238.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
                  "product_id": "kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
                  "product_id": "kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
                  "product_id": "kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-238.9.1.el5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-238.9.1.el5.ppc",
                "product": {
                  "name": "kernel-headers-0:2.6.18-238.9.1.el5.ppc",
                  "product_id": "kernel-headers-0:2.6.18-238.9.1.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.9.1.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-238.9.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.18-238.9.1.el5.s390x",
                  "product_id": "kernel-debug-0:2.6.18-238.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-238.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-238.9.1.el5.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.18-238.9.1.el5.s390x",
                  "product_id": "kernel-devel-0:2.6.18-238.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-238.9.1.el5.s390x",
                "product": {
                  "name": "kernel-0:2.6.18-238.9.1.el5.s390x",
                  "product_id": "kernel-0:2.6.18-238.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-238.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-238.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-238.9.1.el5.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.18-238.9.1.el5.s390x",
                  "product_id": "kernel-headers-0:2.6.18-238.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
                  "product_id": "kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-238.9.1.el5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
                  "product_id": "kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
                  "product_id": "kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-238.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-0:2.6.18-238.9.1.el5.x86_64",
                  "product_id": "kernel-0:2.6.18-238.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-238.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64",
                  "product_id": "kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
                  "product_id": "kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
                  "product_id": "kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.9.1.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-238.9.1.el5.src",
                "product": {
                  "name": "kernel-0:2.6.18-238.9.1.el5.src",
                  "product_id": "kernel-0:2.6.18-238.9.1.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-238.9.1.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.18-238.9.1.el5.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.18-238.9.1.el5.noarch",
                  "product_id": "kernel-doc-0:2.6.18-238.9.1.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-238.9.1.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-238.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-238.9.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-238.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-238.9.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-238.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-238.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-238.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-238.9.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-238.9.1.el5.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-238.9.1.el5.src",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-238.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-238.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-238.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.9.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-238.9.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-238.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-238.9.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-238.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-238.9.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-238.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-238.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-238.9.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-238.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-238.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-238.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-238.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-238.9.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-238.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-238.9.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-238.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-238.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-238.9.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-238.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-238.9.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-doc-0:2.6.18-238.9.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-238.9.1.el5.noarch",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-238.9.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-238.9.1.el5.i386",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-238.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-238.9.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-238.9.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-238.9.1.el5.ppc",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-238.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-238.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-238.9.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-238.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-238.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-238.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-238.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-238.9.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-238.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-238.9.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-238.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-238.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Tavis Ormandy"
          ]
        }
      ],
      "cve": "CVE-2010-4346",
      "discovery_date": "2010-12-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "662189"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The install_special_mapping function in mm/mmap.c in the Linux kernel before 2.6.37-rc6 does not make an expected security_file_mmap function call, which allows local users to bypass intended mmap_min_addr restrictions and possibly conduct NULL pointer dereference attacks via a crafted assembly-language application.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: install_special_mapping skips security_file_mmap check",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 4 is not vulnerable because it checks for mmap_min_addr even in special cases.\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG have mmap_min_addr sysctl tunable set to 4096, and therefore are not affected by this issue. However, as a preventive measure (for example, for administrators who have increased mmap_min_addr), we have addressed this in Red Hat Enterprise Linux 5, 6 and MRG via https://rhn.redhat.com/errata/RHSA-2011-0429.html, https://rhn.redhat.com/errata/RHSA-2011-0421.html, and https://rhn.redhat.com/errata/RHSA-2011-0330.html.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.src",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-doc-0:2.6.18-238.9.1.el5.noarch",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.i386",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-4346"
        },
        {
          "category": "external",
          "summary": "RHBZ#662189",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=662189"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4346",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-4346"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4346",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4346"
        }
      ],
      "release_date": "2010-12-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.9.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0429"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.9.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: install_special_mapping skips security_file_mmap check"
    },
    {
      "cve": "CVE-2011-0521",
      "discovery_date": "2011-01-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "672398"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The dvb_ca_ioctl function in drivers/media/dvb/ttpci/av7110_ca.c in the Linux kernel before 2.6.38-rc2 does not check the sign of a certain integer field, which allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a negative value.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: av7110 negative array offset",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise Linux 3 as it did not include support for ULE (Unidirectional Lightweight Encapsulation). We have included a fix for this issue in Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG however the affected module is not build by default.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.src",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-doc-0:2.6.18-238.9.1.el5.noarch",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.i386",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0521"
        },
        {
          "category": "external",
          "summary": "RHBZ#672398",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672398"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0521",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0521"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0521",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0521"
        }
      ],
      "release_date": "2011-01-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.9.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0429"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.9.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: av7110 negative array offset"
    },
    {
      "cve": "CVE-2011-0710",
      "discovery_date": "2011-02-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "677850"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The task_show_regs function in arch/s390/kernel/traps.c in the Linux kernel before 2.6.38-rc4-next-20110216 on the s390 platform allows local users to obtain the values of the registers of an arbitrary process by reading a status file under /proc/.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: s390 task_show_regs infoleak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise MRG as it does not have support for the S390 architecture. A future kernel update in Red Hat Enterprise Linux 6 may address this flaw. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle,\nhttps://access.redhat.com/support/policy/updates/errata/, therefore the fix for\nthis issue is not currently planned to be included in the future updates. This has been addressed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2011-0429.html.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.src",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-doc-0:2.6.18-238.9.1.el5.noarch",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.i386",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0710"
        },
        {
          "category": "external",
          "summary": "RHBZ#677850",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677850"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0710",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0710"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0710",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0710"
        }
      ],
      "release_date": "2011-02-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.9.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0429"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.9.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: s390 task_show_regs infoleak"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Timo Warns"
          ]
        }
      ],
      "cve": "CVE-2011-1010",
      "discovery_date": "2011-02-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "679282"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in the mac_partition function in fs/partitions/mac.c in the Linux kernel before 2.6.37.2 allows local users to cause a denial of service (panic) or possibly have unspecified other impact via a malformed Mac OS partition table.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fs/partitions: Validate map_count in Mac partition tables",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0429.html, https://rhn.redhat.com/errata/RHSA-2011-0542.html and https://rhn.redhat.com/errata/RHSA-2011-0500.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.src",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-doc-0:2.6.18-238.9.1.el5.noarch",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.i386",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-1010"
        },
        {
          "category": "external",
          "summary": "RHBZ#679282",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=679282"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1010",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-1010"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1010",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1010"
        }
      ],
      "release_date": "2011-02-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.9.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0429"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.9.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: fs/partitions: Validate map_count in Mac partition tables"
    },
    {
      "cve": "CVE-2011-1090",
      "discovery_date": "2011-03-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "682641"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The __nfs4_proc_set_acl function in fs/nfs/nfs4proc.c in the Linux kernel before 2.6.38 stores NFSv4 ACL data in memory that is allocated by kmalloc but not properly freed, which allows local users to cause a denial of service (panic) via a crafted attempt to set an ACL.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not backport the upstream commit 4b580ee3 that introduced this issue. This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0429.html, https://rhn.redhat.com/errata/RHSA-2011-0542.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.src",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-doc-0:2.6.18-238.9.1.el5.noarch",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.i386",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-1090"
        },
        {
          "category": "external",
          "summary": "RHBZ#682641",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=682641"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1090",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-1090"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1090",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1090"
        }
      ],
      "release_date": "2011-03-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.9.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0429"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.9.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Ryan Sweat"
          ]
        }
      ],
      "cve": "CVE-2011-1478",
      "discovery_date": "2011-02-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "691270"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The napi_reuse_skb function in net/core/dev.c in the Generic Receive Offload (GRO) implementation in the Linux kernel before 2.6.38 does not reset the values of certain structure members, which might allow remote attackers to cause a denial of service (NULL pointer dereference) via a malformed VLAN frame.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: gro: reset dev and skb_iff on skb reuse",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not support Generic Receive Offload (GRO). It has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0429.html, https://rhn.redhat.com/errata/RHSA-2011-0421.html and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.src",
          "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-doc-0:2.6.18-238.9.1.el5.noarch",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.i386",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-1478"
        },
        {
          "category": "external",
          "summary": "RHBZ#691270",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=691270"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1478",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-1478"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1478",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1478"
        }
      ],
      "release_date": "2011-02-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.9.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0429"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 5.7,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.9.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.9.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.9.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.9.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: gro: reset dev and skb_iff on skb reuse"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...