rhsa-2011_0927
Vulnerability from csaf_redhat
Published
2011-07-15 05:14
Modified
2024-11-05 17:32
Summary
Red Hat Security Advisory: kernel security and bug fix update

Notes

Topic
Updated kernel packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issues: * An integer overflow flaw in ib_uverbs_poll_cq() could allow a local, unprivileged user to cause a denial of service or escalate their privileges. (CVE-2010-4649, Important) * A race condition in the way new InfiniBand connections were set up could allow a remote user to cause a denial of service. (CVE-2011-0695, Important) * A flaw in the Stream Control Transmission Protocol (SCTP) implementation could allow a remote attacker to cause a denial of service if the sysctl "net.sctp.addip_enable" variable was turned on (it is off by default). (CVE-2011-1573, Important) * Flaws in the AGPGART driver implementation when handling certain IOCTL commands could allow a local, unprivileged user to cause a denial of service or escalate their privileges. (CVE-2011-1745, CVE-2011-2022, Important) * An integer overflow flaw in agp_allocate_memory() could allow a local, unprivileged user to cause a denial of service or escalate their privileges. (CVE-2011-1746, Important) * A flaw allowed napi_reuse_skb() to be called on VLAN (virtual LAN) packets. An attacker on the local network could trigger this flaw by sending specially-crafted packets to a target system, possibly causing a denial of service. (CVE-2011-1576, Moderate) * An integer signedness error in next_pidmap() could allow a local, unprivileged user to cause a denial of service. (CVE-2011-1593, Moderate) * A flaw in the way the Xen hypervisor implementation handled CPUID instruction emulation during virtual machine exits could allow an unprivileged guest user to crash a guest. This only affects systems that have an Intel x86 processor with the Intel VT-x extension enabled. (CVE-2011-1936, Moderate) * A flaw in inet_diag_bc_audit() could allow a local, unprivileged user to cause a denial of service (infinite loop). (CVE-2011-2213, Moderate) * A missing initialization flaw in the XFS file system implementation could lead to an information leak. (CVE-2011-0711, Low) * A flaw in ib_uverbs_poll_cq() could allow a local, unprivileged user to cause an information leak. (CVE-2011-1044, Low) * A missing validation check was found in the signals implementation. A local, unprivileged user could use this flaw to send signals via the sigqueueinfo system call, with the si_code set to SI_TKILL and with spoofed process and user IDs, to other processes. Note: This flaw does not allow existing permission checks to be bypassed; signals can only be sent if your privileges allow you to already do so. (CVE-2011-1182, Low) * A heap overflow flaw in the EFI GUID Partition Table (GPT) implementation could allow a local attacker to cause a denial of service by mounting a disk containing specially-crafted partition tables. (CVE-2011-1776, Low) * Structure padding in two structures in the Bluetooth implementation was not initialized properly before being copied to user-space, possibly allowing local, unprivileged users to leak kernel stack memory to user-space. (CVE-2011-2492, Low) Red Hat would like to thank Jens Kuehnel for reporting CVE-2011-0695; Vasiliy Kulikov for reporting CVE-2011-1745, CVE-2011-2022, and CVE-2011-1746; Ryan Sweat for reporting CVE-2011-1576; Robert Swiecki for reporting CVE-2011-1593; Dan Rosenberg for reporting CVE-2011-2213 and CVE-2011-0711; Julien Tinnes of the Google Security Team for reporting CVE-2011-1182; Timo Warns for reporting CVE-2011-1776; and Marek Kroemeke and Filip Palian for reporting CVE-2011-2492. Bug fix documentation will be available shortly from the Technical Notes document linked to in the References. Users should upgrade to these updated packages, which contain backported patches to correct these issues, and fix the bugs noted in the Technical Notes. The system must be rebooted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* An integer overflow flaw in ib_uverbs_poll_cq() could allow a local,\nunprivileged user to cause a denial of service or escalate their\nprivileges. (CVE-2010-4649, Important)\n\n* A race condition in the way new InfiniBand connections were set up could\nallow a remote user to cause a denial of service. (CVE-2011-0695,\nImportant)\n\n* A flaw in the Stream Control Transmission Protocol (SCTP) implementation\ncould allow a remote attacker to cause a denial of service if the sysctl\n\"net.sctp.addip_enable\" variable was turned on (it is off by default).\n(CVE-2011-1573, Important)\n\n* Flaws in the AGPGART driver implementation when handling certain IOCTL\ncommands could allow a local, unprivileged user to cause a denial of\nservice or escalate their privileges. (CVE-2011-1745, CVE-2011-2022,\nImportant)\n\n* An integer overflow flaw in agp_allocate_memory() could allow a local,\nunprivileged user to cause a denial of service or escalate their\nprivileges. (CVE-2011-1746, Important)\n\n* A flaw allowed napi_reuse_skb() to be called on VLAN (virtual LAN)\npackets. An attacker on the local network could trigger this flaw by\nsending specially-crafted packets to a target system, possibly causing a\ndenial of service. (CVE-2011-1576, Moderate)\n\n* An integer signedness error in next_pidmap() could allow a local,\nunprivileged user to cause a denial of service. (CVE-2011-1593, Moderate)\n\n* A flaw in the way the Xen hypervisor implementation handled CPUID\ninstruction emulation during virtual machine exits could allow an\nunprivileged guest user to crash a guest. This only affects systems that\nhave an Intel x86 processor with the Intel VT-x extension enabled.\n(CVE-2011-1936, Moderate)\n\n* A flaw in inet_diag_bc_audit() could allow a local, unprivileged user to\ncause a denial of service (infinite loop). (CVE-2011-2213, Moderate)\n\n* A missing initialization flaw in the XFS file system implementation\ncould lead to an information leak. (CVE-2011-0711, Low)\n\n* A flaw in ib_uverbs_poll_cq() could allow a local, unprivileged user to\ncause an information leak. (CVE-2011-1044, Low)\n\n* A missing validation check was found in the signals implementation. A\nlocal, unprivileged user could use this flaw to send signals via the\nsigqueueinfo system call, with the si_code set to SI_TKILL and with spoofed\nprocess and user IDs, to other processes. Note: This flaw does not allow\nexisting permission checks to be bypassed; signals can only be sent if your\nprivileges allow you to already do so. (CVE-2011-1182, Low)\n\n* A heap overflow flaw in the EFI GUID Partition Table (GPT) implementation\ncould allow a local attacker to cause a denial of service by mounting a\ndisk containing specially-crafted partition tables. (CVE-2011-1776, Low)\n\n* Structure padding in two structures in the Bluetooth implementation\nwas not initialized properly before being copied to user-space, possibly\nallowing local, unprivileged users to leak kernel stack memory to\nuser-space. (CVE-2011-2492, Low)\n\nRed Hat would like to thank Jens Kuehnel for reporting CVE-2011-0695;\nVasiliy Kulikov for reporting CVE-2011-1745, CVE-2011-2022, and\nCVE-2011-1746; Ryan Sweat for reporting CVE-2011-1576; Robert Swiecki for\nreporting CVE-2011-1593; Dan Rosenberg for reporting CVE-2011-2213 and\nCVE-2011-0711; Julien Tinnes of the Google Security Team for reporting\nCVE-2011-1182; Timo Warns for reporting CVE-2011-1776; and Marek Kroemeke\nand Filip Palian for reporting CVE-2011-2492.\n\nBug fix documentation will be available shortly from the Technical Notes\ndocument linked to in the References.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues, and fix the bugs noted in the Technical\nNotes. The system must be rebooted for this update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2011:0927",
        "url": "https://access.redhat.com/errata/RHSA-2011:0927"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.6_Technical_Notes/kernel.html#RHSA-2011-0927",
        "url": "https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.6_Technical_Notes/kernel.html#RHSA-2011-0927"
      },
      {
        "category": "external",
        "summary": "653648",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=653648"
      },
      {
        "category": "external",
        "summary": "667916",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667916"
      },
      {
        "category": "external",
        "summary": "677260",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677260"
      },
      {
        "category": "external",
        "summary": "690028",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=690028"
      },
      {
        "category": "external",
        "summary": "695173",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695173"
      },
      {
        "category": "external",
        "summary": "695383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695383"
      },
      {
        "category": "external",
        "summary": "697822",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=697822"
      },
      {
        "category": "external",
        "summary": "698996",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=698996"
      },
      {
        "category": "external",
        "summary": "698998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=698998"
      },
      {
        "category": "external",
        "summary": "703019",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703019"
      },
      {
        "category": "external",
        "summary": "703026",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703026"
      },
      {
        "category": "external",
        "summary": "703056",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703056"
      },
      {
        "category": "external",
        "summary": "706323",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706323"
      },
      {
        "category": "external",
        "summary": "707899",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=707899"
      },
      {
        "category": "external",
        "summary": "711519",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711519"
      },
      {
        "category": "external",
        "summary": "714536",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=714536"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0927.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-05T17:32:34+00:00",
      "generator": {
        "date": "2024-11-05T17:32:34+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.1.1"
        }
      },
      "id": "RHSA-2011:0927",
      "initial_release_date": "2011-07-15T05:14:00+00:00",
      "revision_history": [
        {
          "date": "2011-07-15T05:14:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2011-07-15T02:07:56+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-05T17:32:34+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5.6.z server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5.6.z server)",
                  "product_id": "5Server-5.6.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
                  "product_id": "kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-238.19.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
                  "product_id": "kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.19.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
                  "product_id": "kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.19.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.19.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.19.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.19.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
                  "product_id": "kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.19.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
                  "product_id": "kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.19.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-238.19.1.el5.ppc64",
                "product": {
                  "name": "kernel-0:2.6.18-238.19.1.el5.ppc64",
                  "product_id": "kernel-0:2.6.18-238.19.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-238.19.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
                  "product_id": "kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-238.19.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-238.19.1.el5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-238.19.1.el5.ppc",
                "product": {
                  "name": "kernel-headers-0:2.6.18-238.19.1.el5.ppc",
                  "product_id": "kernel-headers-0:2.6.18-238.19.1.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.19.1.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
                  "product_id": "kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-238.19.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-238.19.1.el5.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.18-238.19.1.el5.s390x",
                  "product_id": "kernel-headers-0:2.6.18-238.19.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.19.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-238.19.1.el5.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.18-238.19.1.el5.s390x",
                  "product_id": "kernel-devel-0:2.6.18-238.19.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.19.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.19.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.19.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.19.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-238.19.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.18-238.19.1.el5.s390x",
                  "product_id": "kernel-debug-0:2.6.18-238.19.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.19.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.19.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-238.19.1.el5.s390x",
                "product": {
                  "name": "kernel-0:2.6.18-238.19.1.el5.s390x",
                  "product_id": "kernel-0:2.6.18-238.19.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-238.19.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-238.19.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-238.19.1.el5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-238.19.1.el5.ia64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-238.19.1.el5.ia64",
                  "product_id": "kernel-headers-0:2.6.18-238.19.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.19.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-238.19.1.el5.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-238.19.1.el5.ia64",
                  "product_id": "kernel-devel-0:2.6.18-238.19.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.19.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.19.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.19.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.19.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-238.19.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-238.19.1.el5.ia64",
                  "product_id": "kernel-debug-0:2.6.18-238.19.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.19.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.19.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-238.19.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-238.19.1.el5.ia64",
                  "product_id": "kernel-xen-0:2.6.18-238.19.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.19.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
                  "product_id": "kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.19.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
                  "product_id": "kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.19.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-238.19.1.el5.ia64",
                "product": {
                  "name": "kernel-0:2.6.18-238.19.1.el5.ia64",
                  "product_id": "kernel-0:2.6.18-238.19.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-238.19.1.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
                  "product_id": "kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.19.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
                  "product_id": "kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.19.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.19.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.19.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.19.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
                  "product_id": "kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.19.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.19.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
                  "product_id": "kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.19.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64",
                  "product_id": "kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.19.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.19.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-238.19.1.el5.x86_64",
                "product": {
                  "name": "kernel-0:2.6.18-238.19.1.el5.x86_64",
                  "product_id": "kernel-0:2.6.18-238.19.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-238.19.1.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-238.19.1.el5.i386",
                "product": {
                  "name": "kernel-headers-0:2.6.18-238.19.1.el5.i386",
                  "product_id": "kernel-headers-0:2.6.18-238.19.1.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.19.1.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-238.19.1.el5.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.18-238.19.1.el5.i686",
                  "product_id": "kernel-devel-0:2.6.18-238.19.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.19.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.19.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
                  "product_id": "kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.19.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
                  "product_id": "kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-238.19.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.19.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-238.19.1.el5.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.18-238.19.1.el5.i686",
                  "product_id": "kernel-debug-0:2.6.18-238.19.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.19.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-0:2.6.18-238.19.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-0:2.6.18-238.19.1.el5.i686",
                  "product_id": "kernel-PAE-0:2.6.18-238.19.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-238.19.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.19.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-238.19.1.el5.i686",
                "product": {
                  "name": "kernel-xen-0:2.6.18-238.19.1.el5.i686",
                  "product_id": "kernel-xen-0:2.6.18-238.19.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.19.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
                  "product_id": "kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.19.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
                  "product_id": "kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.19.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
                  "product_id": "kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-238.19.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-238.19.1.el5.i686",
                "product": {
                  "name": "kernel-0:2.6.18-238.19.1.el5.i686",
                  "product_id": "kernel-0:2.6.18-238.19.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-238.19.1.el5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.18-238.19.1.el5.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.18-238.19.1.el5.noarch",
                  "product_id": "kernel-doc-0:2.6.18-238.19.1.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-238.19.1.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-238.19.1.el5.src",
                "product": {
                  "name": "kernel-0:2.6.18-238.19.1.el5.src",
                  "product_id": "kernel-0:2.6.18-238.19.1.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-238.19.1.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-238.19.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-238.19.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-238.19.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-238.19.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-238.19.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-238.19.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-238.19.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-238.19.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-238.19.1.el5.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-238.19.1.el5.src",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-238.19.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-238.19.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-238.19.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-238.19.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-238.19.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-238.19.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-238.19.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-238.19.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-238.19.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-238.19.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-238.19.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-238.19.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-238.19.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-238.19.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-238.19.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-238.19.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-238.19.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-238.19.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-238.19.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-238.19.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-238.19.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-238.19.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-238.19.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-238.19.1.el5.noarch",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-238.19.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-238.19.1.el5.i386",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-238.19.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-238.19.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-238.19.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-238.19.1.el5.ppc",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-238.19.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-238.19.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-238.19.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-238.19.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-238.19.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-238.19.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-238.19.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-238.19.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-238.19.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-238.19.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-238.19.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-238.19.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
          "product_id": "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.6.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2010-4649",
      "discovery_date": "2011-01-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "667916"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer overflow in the ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large value of a certain structure member.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: IB/uverbs: Handle large number of entries in poll CQ",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-4649"
        },
        {
          "category": "external",
          "summary": "RHBZ#667916",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667916"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4649",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-4649"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4649",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4649"
        }
      ],
      "release_date": "2010-12-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-07-15T05:14:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0927"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: IB/uverbs: Handle large number of entries in poll CQ"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Jens Kuehnel"
          ]
        }
      ],
      "cve": "CVE-2011-0695",
      "discovery_date": "2011-02-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "653648"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Race condition in the cm_work_handler function in the InfiniBand driver (drivers/infiniband/core/cma.c) in Linux kernel 2.6.x allows remote attackers to cause a denial of service (panic) by sending an InfiniBand request while other request handlers are still running, which triggers an invalid pointer dereference.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: panic in ib_cm:cm_work_handler",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0927.html, https://rhn.redhat.com/errata/RHSA-2011-0421.html, and https://rhn.redhat.com/errata/RHSA-2011-0500.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0695"
        },
        {
          "category": "external",
          "summary": "RHBZ#653648",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=653648"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0695",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0695"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0695",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0695"
        }
      ],
      "release_date": "2010-11-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-07-15T05:14:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0927"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: panic in ib_cm:cm_work_handler"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Dan Rosenberg"
          ]
        }
      ],
      "cve": "CVE-2011-0711",
      "discovery_date": "2011-02-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "677260"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not have support for the XFS file system. This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise\nMRG via https://rhn.redhat.com/errata/RHSA-2011-0927.html, https://rhn.redhat.com/errata/RHSA-2011-0498.html, and https://rhn.redhat.com/errata/RHSA-2011-0500.html.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0711"
        },
        {
          "category": "external",
          "summary": "RHBZ#677260",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677260"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0711",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0711"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0711",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0711"
        }
      ],
      "release_date": "2011-02-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-07-15T05:14:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0927"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1"
    },
    {
      "cve": "CVE-2011-1044",
      "discovery_date": "2011-01-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "667916"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 does not initialize a certain response buffer, which allows local users to obtain potentially sensitive information from kernel memory via vectors that cause this buffer to be only partially filled, a different vulnerability than CVE-2010-4649.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: IB/uverbs: Handle large number of entries in poll CQ",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-1044"
        },
        {
          "category": "external",
          "summary": "RHBZ#667916",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667916"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1044",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-1044"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1044",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1044"
        }
      ],
      "release_date": "2010-12-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-07-15T05:14:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0927"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: IB/uverbs: Handle large number of entries in poll CQ"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Julien Tinnes"
          ],
          "organization": "Google Security Team"
        }
      ],
      "cve": "CVE-2011-1182",
      "discovery_date": "2011-03-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "690028"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel signal spoofing issue",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates. This was addressed in Red Hat Enterprise Linux 5 and 6 via https://rhn.redhat.com/errata/RHSA-2011-0927.html and https://rhn.redhat.com/errata/RHSA-2011-1189.html. A future kernel update in Red Hat Enterprise MRG may address this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-1182"
        },
        {
          "category": "external",
          "summary": "RHBZ#690028",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=690028"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1182",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-1182"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1182",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1182"
        }
      ],
      "release_date": "2011-03-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-07-15T05:14:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0927"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel signal spoofing issue"
    },
    {
      "cve": "CVE-2011-1573",
      "discovery_date": "2011-04-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "695383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "net/sctp/sm_make_chunk.c in the Linux kernel before 2.6.34, when addip_enable and auth_enable are used, does not consider the amount of zero padding during calculation of chunk lengths for (1) INIT and (2) INIT ACK chunks, which allows remote attackers to cause a denial of service (OOPS) via crafted packet data.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: sctp: fix to calc the INIT/INIT-ACK chunk length correctly to set",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not support SCTP authentication and extended parameters. It did not affect the version of Linux kernel as shipped with Red Hat Enterprise MRG as it has backported the upstream commit a8170c35 that addressed this. This has been addressed in Red Hat Enterprise Linux 5 and 6 via https://rhn.redhat.com/errata/RHSA-2011-0927.html and https://rhn.redhat.com/errata/RHSA-2011-0498.html.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-1573"
        },
        {
          "category": "external",
          "summary": "RHBZ#695383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1573",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-1573"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1573",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1573"
        }
      ],
      "release_date": "2010-04-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-07-15T05:14:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0927"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 5.4,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: sctp: fix to calc the INIT/INIT-ACK chunk length correctly to set"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Ryan Sweat"
          ]
        }
      ],
      "cve": "CVE-2011-1576",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2011-02-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "695173"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Generic Receive Offload (GRO) implementation in the Linux kernel 2.6.18 on Red Hat Enterprise Linux 5 and 2.6.32 on Red Hat Enterprise Linux 6, as used in Red Hat Enterprise Virtualization (RHEV) Hypervisor and other products, allows remote attackers to cause a denial of service via crafted VLAN packets that are processed by the napi_reuse_skb function, leading to (1) a memory leak or (2) memory corruption, a different vulnerability than CVE-2011-1478.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: net: Fix memory leak/corruption on VLAN GRO_DROP",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 as it did not support Generic Receive Offload (GRO). This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0927.html and https://rhn.redhat.com/errata/RHSA-2011-1189.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-1576"
        },
        {
          "category": "external",
          "summary": "RHBZ#695173",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695173"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-1576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1576"
        }
      ],
      "release_date": "2011-06-06T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-07-15T05:14:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0927"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 5.7,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: net: Fix memory leak/corruption on VLAN GRO_DROP"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Robert Swiecki"
          ]
        }
      ],
      "cve": "CVE-2011-1593",
      "discovery_date": "2011-04-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "697822"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple integer overflows in the next_pidmap function in kernel/pid.c in the Linux kernel before 2.6.38.4 allow local users to cause a denial of service (system crash) via a crafted (1) getdents or (2) readdir system call.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: proc: signedness issue in next_pidmap()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 4, 5, 6, and Red Hat Enterprise MRG. This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0927.html, https://rhn.redhat.com/errata/RHSA-2011-1189.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-1593"
        },
        {
          "category": "external",
          "summary": "RHBZ#697822",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=697822"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1593",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-1593"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1593",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1593"
        }
      ],
      "release_date": "2011-04-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-07-15T05:14:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0927"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.7,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: proc: signedness issue in next_pidmap()"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Vasiliy Kulikov"
          ],
          "organization": "Openwall"
        }
      ],
      "cve": "CVE-2011-1745",
      "discovery_date": "2011-04-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "698996"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer overflow in the agp_generic_insert_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_BIND agp_ioctl ioctl call.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of Linux kernel as shipped with Red Hat\nEnterprise 4, 5, 6, and Red Hat Enterprise MRG. This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0927.html, https://rhn.redhat.com/errata/RHSA-2011-1350.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-1745"
        },
        {
          "category": "external",
          "summary": "RHBZ#698996",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=698996"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1745",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-1745"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1745",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1745"
        }
      ],
      "release_date": "2011-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-07-15T05:14:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0927"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "SINGLE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Vasiliy Kulikov"
          ],
          "organization": "Openwall"
        }
      ],
      "cve": "CVE-2011-1746",
      "discovery_date": "2011-04-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "698998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple integer overflows in the (1) agp_allocate_memory and (2) agp_create_user_memory functions in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allow local users to trigger buffer overflows, and consequently cause a denial of service (system crash) or possibly have unspecified other impact, via vectors related to calls that specify a large number of memory pages.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: agp: insufficient page_count parameter checking in agp_allocate_memory()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of Linux kernel as shipped with Red Hat Enterprise 4, 5, 6, and Red Hat Enterprise MRG. This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0927.html, https://rhn.redhat.com/errata/RHSA-2011-1350.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-1746"
        },
        {
          "category": "external",
          "summary": "RHBZ#698998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=698998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1746",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-1746"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1746",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1746"
        }
      ],
      "release_date": "2011-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-07-15T05:14:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0927"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "SINGLE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: agp: insufficient page_count parameter checking in agp_allocate_memory()"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Timo Warns"
          ]
        }
      ],
      "cve": "CVE-2011-1776",
      "discovery_date": "2011-05-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "703026"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The is_gpt_valid function in fs/partitions/efi.c in the Linux kernel before 2.6.39 does not check the size of an Extensible Firmware Interface (EFI) GUID Partition Table (GPT) entry, which allows physically proximate attackers to cause a denial of service (heap-based buffer overflow and OOPS) or obtain sensitive information from kernel heap memory by connecting a crafted GPT storage device, a different vulnerability than CVE-2011-1577.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: validate size of EFI GUID partition entries",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of Linux kernel as shipped with Red Hat\nEnterprise 4, 5, 6, and Red Hat Enterprise MRG. This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0927.html and https://rhn.redhat.com/errata/RHSA-2011-1189.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-1776"
        },
        {
          "category": "external",
          "summary": "RHBZ#703026",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703026"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1776",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-1776"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1776",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1776"
        }
      ],
      "release_date": "2011-05-06T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-07-15T05:14:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0927"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: validate size of EFI GUID partition entries"
    },
    {
      "cve": "CVE-2011-1936",
      "discovery_date": "2011-05-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "706323"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: xen: vmx: insecure cpuid vmexit",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The versions of the Linux kernel as shipped with Red Hat Enterprise Linux 4, 6, and Red Hat Enterprise MRG are not affected. This has been addressed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2011-0927.html.\n\nAlso, only systems running on x86 architecture with Intel processor and VMX\nvirtualization extension enabled are affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-1936"
        },
        {
          "category": "external",
          "summary": "RHBZ#706323",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706323"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1936",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-1936"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1936",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1936"
        }
      ],
      "release_date": "2011-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-07-15T05:14:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0927"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: xen: vmx: insecure cpuid vmexit"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Vasiliy Kulikov"
          ],
          "organization": "Openwall"
        }
      ],
      "cve": "CVE-2011-2022",
      "discovery_date": "2011-04-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "698996"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The agp_generic_remove_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 does not validate a certain start parameter, which allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_UNBIND agp_ioctl ioctl call, a different vulnerability than CVE-2011-1745.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of Linux kernel as shipped with Red Hat\nEnterprise 4, 5, 6, and Red Hat Enterprise MRG. This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0927.html, https://rhn.redhat.com/errata/RHSA-2011-1350.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2022"
        },
        {
          "category": "external",
          "summary": "RHBZ#698996",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=698996"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2022",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2022"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2022",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2022"
        }
      ],
      "release_date": "2011-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-07-15T05:14:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0927"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "SINGLE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Dan Rosenberg"
          ]
        }
      ],
      "cve": "CVE-2011-2213",
      "discovery_date": "2011-06-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "714536"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The inet_diag_bc_audit function in net/ipv4/inet_diag.c in the Linux kernel before 2.6.39.3 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message, as demonstrated by an INET_DIAG_BC_JMP instruction with a zero yes value, a different vulnerability than CVE-2010-3880.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: inet_diag: insufficient validation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the Linux kernel as shipped with Red Hat Enterprise Linux 4,\n5, 6, and Red Hat Enterprise MRG. Red Hat Enterprise Linux 4 is now in\nProduction 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates. This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0927.html, https://rhn.redhat.com/errata/RHSA-2011-1189.html and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2213"
        },
        {
          "category": "external",
          "summary": "RHBZ#714536",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=714536"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2213",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2213"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2213",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2213"
        }
      ],
      "release_date": "2011-06-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-07-15T05:14:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0927"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: inet_diag: insufficient validation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Marek Kroemeke",
            "Filip Palian"
          ]
        }
      ],
      "cve": "CVE-2011-2492",
      "discovery_date": "2011-05-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "703019"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The bluetooth subsystem in the Linux kernel before 3.0-rc4 does not properly initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel memory via a crafted getsockopt system call, related to (1) the l2cap_sock_getsockopt_old function in net/bluetooth/l2cap_sock.c and (2) the rfcomm_sock_getsockopt_old function in net/bluetooth/rfcomm/sock.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, 6, and Red Hat Enterprise MRG. It has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0927.html, https://rhn.redhat.com/errata/RHSA-2011-1189.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
          "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
          "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
          "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2492"
        },
        {
          "category": "external",
          "summary": "RHBZ#703019",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703019"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2492",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2492"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2492",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2492"
        }
      ],
      "release_date": "2011-05-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-07-15T05:14:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0927"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 1.9,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.src",
            "5Server-5.6.Z:kernel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-devel-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-doc-0:2.6.18-238.19.1.el5.noarch",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.i386",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-headers-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.ppc64",
            "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.19.1.el5.s390x",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.19.1.el5.x86_64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.i686",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.ia64",
            "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.19.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.