rhsa-2014_0913
Vulnerability from csaf_redhat
Published
2014-07-22 18:00
Modified
2024-09-13 09:18
Summary
Red Hat Security Advisory: kernel-rt security update

Notes

Topic
Updated kernel-rt packages that fix multiple security issues are now available for Red Hat Enterprise MRG 2.5. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
Details
The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. * A flaw was found in the way the Linux kernel's futex subsystem handled the requeuing of certain Priority Inheritance (PI) futexes. A local, unprivileged user could use this flaw to escalate their privileges on the system. (CVE-2014-3153, Important) * It was found that the Linux kernel's ptrace subsystem allowed a traced process' instruction pointer to be set to a non-canonical memory address without forcing the non-sysret code path when returning to user space. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-4699, Important) Note: The CVE-2014-4699 issue only affected systems using an Intel CPU. * It was found that the permission checks performed by the Linux kernel when a netlink message was received were not sufficient. A local, unprivileged user could potentially bypass these restrictions by passing a netlink socket as stdout or stderr to a more privileged process and altering the output of this process. (CVE-2014-0181, Moderate) * It was found that the aio_read_events_ring() function of the Linux kernel's Asynchronous I/O (AIO) subsystem did not properly sanitize the AIO ring head received from user space. A local, unprivileged user could use this flaw to disclose random parts of the (physical) memory belonging to the kernel and/or other processes. (CVE-2014-0206, Moderate) * An out-of-bounds memory access flaw was found in the Netlink Attribute extension of the Berkeley Packet Filter (BPF) interpreter functionality in the Linux kernel's networking implementation. A local, unprivileged user could use this flaw to crash the system or leak kernel memory to user space via a specially crafted socket filter. (CVE-2014-3144, CVE-2014-3145, Moderate) * An out-of-bounds memory access flaw was found in the Linux kernel's system call auditing implementation. On a system with existing audit rules defined, a local, unprivileged user could use this flaw to leak kernel memory to user space or, potentially, crash the system. (CVE-2014-3917, Moderate) * A flaw was found in the way Linux kernel's Transparent Huge Pages (THP) implementation handled non-huge page migration. A local, unprivileged user could use this flaw to crash the kernel by migrating transparent hugepages. (CVE-2014-3940, Moderate) * An integer underflow flaw was found in the way the Linux kernel's Stream Control Transmission Protocol (SCTP) implementation processed certain COOKIE_ECHO packets. By sending a specially crafted SCTP packet, a remote attacker could use this flaw to prevent legitimate connections to a particular SCTP server socket to be made. (CVE-2014-4667, Moderate) * An information leak flaw was found in the RAM Disks Memory Copy (rd_mcp) backend driver of the iSCSI Target subsystem of the Linux kernel. A privileged user could use this flaw to leak the contents of kernel memory to an iSCSI initiator remote client. (CVE-2014-4027, Low) Red Hat would like to thank Kees Cook of Google for reporting CVE-2014-3153, Andy Lutomirski for reporting CVE-2014-4699 and CVE-2014-0181, and Gopal Reddy Kodudula of Nokia Siemens Networks for reporting CVE-2014-4667. Google acknowledges Pinkie Pie as the original reporter of CVE-2014-3153. The CVE-2014-0206 issue was discovered by Mateusz Guzik of Red Hat. Users are advised to upgrade to these updated packages, which upgrade the kernel-rt kernel to version kernel-rt-3.10.33-rt32.43 and correct these issues. The system must be rebooted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel-rt packages that fix multiple security issues are now\navailable for Red Hat Enterprise MRG 2.5.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A flaw was found in the way the Linux kernel\u0027s futex subsystem handled\nthe requeuing of certain Priority Inheritance (PI) futexes. A local,\nunprivileged user could use this flaw to escalate their privileges on the\nsystem. (CVE-2014-3153, Important)\n\n* It was found that the Linux kernel\u0027s ptrace subsystem allowed a traced\nprocess\u0027 instruction pointer to be set to a non-canonical memory address\nwithout forcing the non-sysret code path when returning to user space.\nA local, unprivileged user could use this flaw to crash the system or,\npotentially, escalate their privileges on the system. (CVE-2014-4699,\nImportant)\n\nNote: The CVE-2014-4699 issue only affected systems using an Intel CPU.\n\n* It was found that the permission checks performed by the Linux kernel\nwhen a netlink message was received were not sufficient. A local,\nunprivileged user could potentially bypass these restrictions by passing a\nnetlink socket as stdout or stderr to a more privileged process and\naltering the output of this process. (CVE-2014-0181, Moderate)\n\n* It was found that the aio_read_events_ring() function of the Linux\nkernel\u0027s Asynchronous I/O (AIO) subsystem did not properly sanitize the AIO\nring head received from user space. A local, unprivileged user could use\nthis flaw to disclose random parts of the (physical) memory belonging to\nthe kernel and/or other processes. (CVE-2014-0206, Moderate)\n\n* An out-of-bounds memory access flaw was found in the Netlink Attribute\nextension of the Berkeley Packet Filter (BPF) interpreter functionality in\nthe Linux kernel\u0027s networking implementation. A local, unprivileged user\ncould use this flaw to crash the system or leak kernel memory to user space\nvia a specially crafted socket filter. (CVE-2014-3144, CVE-2014-3145,\nModerate)\n\n* An out-of-bounds memory access flaw was found in the Linux kernel\u0027s\nsystem call auditing implementation. On a system with existing audit rules\ndefined, a local, unprivileged user could use this flaw to leak kernel\nmemory to user space or, potentially, crash the system. (CVE-2014-3917,\nModerate)\n\n* A flaw was found in the way Linux kernel\u0027s Transparent Huge Pages (THP)\nimplementation handled non-huge page migration. A local, unprivileged user\ncould use this flaw to crash the kernel by migrating transparent hugepages.\n(CVE-2014-3940, Moderate)\n\n* An integer underflow flaw was found in the way the Linux kernel\u0027s Stream\nControl Transmission Protocol (SCTP) implementation processed certain\nCOOKIE_ECHO packets. By sending a specially crafted SCTP packet, a remote\nattacker could use this flaw to prevent legitimate connections to a\nparticular SCTP server socket to be made. (CVE-2014-4667, Moderate)\n\n* An information leak flaw was found in the RAM Disks Memory Copy (rd_mcp)\nbackend driver of the iSCSI Target subsystem of the Linux kernel.\nA privileged user could use this flaw to leak the contents of kernel memory\nto an iSCSI initiator remote client. (CVE-2014-4027, Low)\n\nRed Hat would like to thank Kees Cook of Google for reporting\nCVE-2014-3153, Andy Lutomirski for reporting CVE-2014-4699 and\nCVE-2014-0181, and Gopal Reddy Kodudula of Nokia Siemens Networks for\nreporting CVE-2014-4667. Google acknowledges Pinkie Pie as the original\nreporter of CVE-2014-3153. The CVE-2014-0206 issue was discovered by\nMateusz Guzik of Red Hat.\n\nUsers are advised to upgrade to these updated packages, which upgrade the\nkernel-rt kernel to version kernel-rt-3.10.33-rt32.43 and correct these\nissues. The system must be rebooted for this update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2014:0913",
        "url": "https://access.redhat.com/errata/RHSA-2014:0913"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1094265",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1094265"
      },
      {
        "category": "external",
        "summary": "1094602",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1094602"
      },
      {
        "category": "external",
        "summary": "1096775",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1096775"
      },
      {
        "category": "external",
        "summary": "1102571",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102571"
      },
      {
        "category": "external",
        "summary": "1103626",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103626"
      },
      {
        "category": "external",
        "summary": "1104097",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1104097"
      },
      {
        "category": "external",
        "summary": "1108744",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108744"
      },
      {
        "category": "external",
        "summary": "1113967",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1113967"
      },
      {
        "category": "external",
        "summary": "1115927",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115927"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2014/rhsa-2014_0913.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security update",
    "tracking": {
      "current_release_date": "2024-09-13T09:18:26+00:00",
      "generator": {
        "date": "2024-09-13T09:18:26+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "3.33.3"
        }
      },
      "id": "RHSA-2014:0913",
      "initial_release_date": "2014-07-22T18:00:11+00:00",
      "revision_history": [
        {
          "date": "2014-07-22T18:00:11+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2014-07-22T18:00:11+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-09-13T09:18:26+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
                "product": {
                  "name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
                  "product_id": "6Server-MRG-Realtime-2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise MRG for RHEL-6"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
                "product": {
                  "name": "kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
                  "product_id": "kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.33-rt32.43.el6rt?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
                "product": {
                  "name": "kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
                  "product_id": "kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.33-rt32.43.el6rt?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_id": "kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.33-rt32.43.el6rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_id": "kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.33-rt32.43.el6rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.33-rt32.43.el6rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
                "product": {
                  "name": "kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_id": "kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@3.10.33-rt32.43.el6rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.33-rt32.43.el6rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.33-rt32.43.el6rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_id": "kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.33-rt32.43.el6rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.33-rt32.43.el6rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.33-rt32.43.el6rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_id": "kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.33-rt32.43.el6rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_id": "kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.33-rt32.43.el6rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_id": "kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.33-rt32.43.el6rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_id": "kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.33-rt32.43.el6rt?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:3.10.33-rt32.43.el6rt.src",
                "product": {
                  "name": "kernel-rt-0:3.10.33-rt32.43.el6rt.src",
                  "product_id": "kernel-rt-0:3.10.33-rt32.43.el6rt.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@3.10.33-rt32.43.el6rt?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.33-rt32.43.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
          "product_id": "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src"
        },
        "product_reference": "kernel-rt-0:3.10.33-rt32.43.el6rt.src",
        "relates_to_product_reference": "6Server-MRG-Realtime-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
          "product_id": "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64"
        },
        "product_reference": "kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
        "relates_to_product_reference": "6Server-MRG-Realtime-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
          "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
        "relates_to_product_reference": "6Server-MRG-Realtime-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
          "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
        "relates_to_product_reference": "6Server-MRG-Realtime-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
          "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
        "relates_to_product_reference": "6Server-MRG-Realtime-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
          "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
        "relates_to_product_reference": "6Server-MRG-Realtime-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
          "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
        "relates_to_product_reference": "6Server-MRG-Realtime-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
          "product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
        "relates_to_product_reference": "6Server-MRG-Realtime-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
          "product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch"
        },
        "product_reference": "kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
        "relates_to_product_reference": "6Server-MRG-Realtime-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
          "product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch"
        },
        "product_reference": "kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
        "relates_to_product_reference": "6Server-MRG-Realtime-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
          "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
        "relates_to_product_reference": "6Server-MRG-Realtime-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
          "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
        "relates_to_product_reference": "6Server-MRG-Realtime-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
          "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
        "relates_to_product_reference": "6Server-MRG-Realtime-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
          "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
        "relates_to_product_reference": "6Server-MRG-Realtime-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
          "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
        "relates_to_product_reference": "6Server-MRG-Realtime-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
          "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64",
        "relates_to_product_reference": "6Server-MRG-Realtime-2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Andy Lutomirski"
          ]
        }
      ],
      "cve": "CVE-2014-0181",
      "discovery_date": "2014-04-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1094265"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was found that the permission checks performed by the Linux kernel when a netlink message was received were not sufficient. A local, unprivileged user could potentially bypass these restrictions by passing a netlink socket as stdout or stderr to a more privileged process and altering the output of this process.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: net: insufficient permision checks of netlink messages",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
          "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
          "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
          "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2014-0181"
        },
        {
          "category": "external",
          "summary": "RHBZ#1094265",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1094265"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0181",
          "url": "https://www.cve.org/CVERecord?id=CVE-2014-0181"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0181",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0181"
        }
      ],
      "release_date": "2014-04-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not use\n\"rpm -Uvh\" as that will remove the running kernel binaries from your\nsystem. You may use \"rpm -e\" to remove old kernels after determining that\nthe new kernel functions properly on your system.",
          "product_ids": [
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0913"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 1.2,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:H/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: net: insufficient permision checks of netlink messages"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Mateusz Guzik"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2014-0206",
      "discovery_date": "2014-05-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1094602"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Array index error in the aio_read_events_ring function in fs/aio.c in the Linux kernel through 3.15.1 allows local users to obtain sensitive information from kernel memory via a large head value.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: aio: insufficient sanitization of head in aio_read_events_ring()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
          "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
          "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
          "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2014-0206"
        },
        {
          "category": "external",
          "summary": "RHBZ#1094602",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1094602"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0206",
          "url": "https://www.cve.org/CVERecord?id=CVE-2014-0206"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0206",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0206"
        }
      ],
      "release_date": "2014-06-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not use\n\"rpm -Uvh\" as that will remove the running kernel binaries from your\nsystem. You may use \"rpm -e\" to remove old kernels after determining that\nthe new kernel functions properly on your system.",
          "product_ids": [
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0913"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: aio: insufficient sanitization of head in aio_read_events_ring()"
    },
    {
      "cve": "CVE-2014-3144",
      "discovery_date": "2014-04-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1096775"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions.  NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel: filter: prevent nla extensions to peek beyond the end of the message",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise Linux 5.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
          "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
          "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
          "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2014-3144"
        },
        {
          "category": "external",
          "summary": "RHBZ#1096775",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1096775"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3144",
          "url": "https://www.cve.org/CVERecord?id=CVE-2014-3144"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3144",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3144"
        }
      ],
      "release_date": "2014-04-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not use\n\"rpm -Uvh\" as that will remove the running kernel binaries from your\nsystem. You may use \"rpm -e\" to remove old kernels after determining that\nthe new kernel functions properly on your system.",
          "product_ids": [
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0913"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 5.4,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Kernel: filter: prevent nla extensions to peek beyond the end of the message"
    },
    {
      "cve": "CVE-2014-3145",
      "discovery_date": "2014-04-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1096775"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 uses the reverse order in a certain subtraction, which allows local users to cause a denial of service (over-read and system crash) via crafted BPF instructions.  NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel: filter: prevent nla extensions to peek beyond the end of the message",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise Linux 5.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
          "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
          "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
          "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2014-3145"
        },
        {
          "category": "external",
          "summary": "RHBZ#1096775",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1096775"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3145",
          "url": "https://www.cve.org/CVERecord?id=CVE-2014-3145"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3145",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3145"
        }
      ],
      "release_date": "2014-04-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not use\n\"rpm -Uvh\" as that will remove the running kernel binaries from your\nsystem. You may use \"rpm -e\" to remove old kernels after determining that\nthe new kernel functions properly on your system.",
          "product_ids": [
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0913"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 5.4,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Kernel: filter: prevent nla extensions to peek beyond the end of the message"
    },
    {
      "cve": "CVE-2014-3153",
      "discovery_date": "2014-05-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1103626"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the Linux kernel\u0027s futex subsystem handled the requeuing of certain Priority Inheritance (PI) futexes. A local, unprivileged user could use this flaw to escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: futex: pi futexes requeue issue",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of the Linux kernel packages as shipped with Red Hat Enterprise Linux 5.\n\nThis issue requires local system access to be exploited. We are currently not aware of any working exploit for Red Hat Enterprise Linux 6 or Red Hat Enterprise MRG 2.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
          "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
          "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
          "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2014-3153"
        },
        {
          "category": "external",
          "summary": "RHBZ#1103626",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103626"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3153",
          "url": "https://www.cve.org/CVERecord?id=CVE-2014-3153"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3153",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3153"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2014-06-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not use\n\"rpm -Uvh\" as that will remove the running kernel binaries from your\nsystem. You may use \"rpm -e\" to remove old kernels after determining that\nthe new kernel functions properly on your system.",
          "product_ids": [
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0913"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-05-25T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: futex: pi futexes requeue issue"
    },
    {
      "cve": "CVE-2014-3917",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2014-05-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1102571"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds memory access flaw was found in the Linux kernel\u0027s system call auditing implementation. On a system with existing audit rules defined, a local, unprivileged user could use this flaw to leak kernel memory to user space or, potentially, crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: DoS with syscall auditing",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
          "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
          "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
          "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2014-3917"
        },
        {
          "category": "external",
          "summary": "RHBZ#1102571",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102571"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3917",
          "url": "https://www.cve.org/CVERecord?id=CVE-2014-3917"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3917",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3917"
        }
      ],
      "release_date": "2014-05-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not use\n\"rpm -Uvh\" as that will remove the running kernel binaries from your\nsystem. You may use \"rpm -e\" to remove old kernels after determining that\nthe new kernel functions properly on your system.",
          "product_ids": [
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0913"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.7,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: DoS with syscall auditing"
    },
    {
      "cve": "CVE-2014-3940",
      "discovery_date": "2014-06-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1104097"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way Linux kernel\u0027s Transparent Huge Pages (THP) implementation handled non-huge page migration. A local, unprivileged user could use this flaw to crash the kernel by migrating transparent hugepages.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel: missing check during hugepage migration",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of the kernel package as shipped with\nRed Hat Enterprise Linux 5.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
          "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
          "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
          "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2014-3940"
        },
        {
          "category": "external",
          "summary": "RHBZ#1104097",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1104097"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3940",
          "url": "https://www.cve.org/CVERecord?id=CVE-2014-3940"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3940",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3940"
        }
      ],
      "release_date": "2014-03-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not use\n\"rpm -Uvh\" as that will remove the running kernel binaries from your\nsystem. You may use \"rpm -e\" to remove old kernels after determining that\nthe new kernel functions properly on your system.",
          "product_ids": [
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0913"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.7,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:H/Au:N/C:N/I:P/A:C",
            "version": "2.0"
          },
          "products": [
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Kernel: missing check during hugepage migration"
    },
    {
      "cve": "CVE-2014-4027",
      "discovery_date": "2014-06-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1108744"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An information leak flaw was found in the RAM Disks Memory Copy (rd_mcp) backend driver of the iSCSI Target subsystem of the Linux kernel. A privileged user could use this flaw to leak the contents of kernel memory to an iSCSI initiator remote client.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel: target/rd: imformation leakage",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of Linux kernel package as shipped with Red Hat Enterprise Linux 6 and 7. Future kernel updates for Red Hat Enterprise Linux 6 and 7 may address this issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
          "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
          "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
          "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2014-4027"
        },
        {
          "category": "external",
          "summary": "RHBZ#1108744",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108744"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2014-4027",
          "url": "https://www.cve.org/CVERecord?id=CVE-2014-4027"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-4027",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4027"
        }
      ],
      "release_date": "2014-01-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not use\n\"rpm -Uvh\" as that will remove the running kernel binaries from your\nsystem. You may use \"rpm -e\" to remove old kernels after determining that\nthe new kernel functions properly on your system.",
          "product_ids": [
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0913"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "SINGLE",
            "availabilityImpact": "NONE",
            "baseScore": 2.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:M/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "Kernel: target/rd: imformation leakage"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Gopal Reddy Kodudula"
          ],
          "organization": "Nokia Siemens Networks"
        }
      ],
      "cve": "CVE-2014-4667",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "discovery_date": "2014-06-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1113967"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An integer underflow flaw was found in the way the Linux kernel\u0027s Stream Control Transmission Protocol (SCTP) implementation processed certain COOKIE_ECHO packets. By sending a specially crafted SCTP packet, a remote attacker could use this flaw to prevent legitimate connections to a particular SCTP server socket to be made.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: sctp: sk_ack_backlog wrap-around problem",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
          "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
          "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
          "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2014-4667"
        },
        {
          "category": "external",
          "summary": "RHBZ#1113967",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1113967"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2014-4667",
          "url": "https://www.cve.org/CVERecord?id=CVE-2014-4667"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-4667",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4667"
        }
      ],
      "release_date": "2014-06-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not use\n\"rpm -Uvh\" as that will remove the running kernel binaries from your\nsystem. You may use \"rpm -e\" to remove old kernels after determining that\nthe new kernel functions properly on your system.",
          "product_ids": [
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0913"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: sctp: sk_ack_backlog wrap-around problem"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Andy Lutomirski"
          ]
        }
      ],
      "cve": "CVE-2014-4699",
      "cwe": {
        "id": "CWE-642",
        "name": "External Control of Critical State Data"
      },
      "discovery_date": "2014-07-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1115927"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was found that the Linux kernel\u0027s ptrace subsystem allowed a traced process\u0027 instruction pointer to be set to a non-canonical memory address without forcing the non-sysret code path when returning to user space. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system.\r\n\r\nNote: The CVE-2014-4699 issue only affected systems using an Intel CPU.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86_64: ptrace: sysret to non-canonical address",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
          "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
          "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
          "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
          "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2014-4699"
        },
        {
          "category": "external",
          "summary": "RHBZ#1115927",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115927"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2014-4699",
          "url": "https://www.cve.org/CVERecord?id=CVE-2014-4699"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-4699",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4699"
        }
      ],
      "release_date": "2014-07-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not use\n\"rpm -Uvh\" as that will remove the running kernel binaries from your\nsystem. You may use \"rpm -e\" to remove old kernels after determining that\nthe new kernel functions properly on your system.",
          "product_ids": [
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0913"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.src",
            "6Server-MRG-Realtime-2:kernel-rt-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.10.33-rt32.43.el6rt.noarch",
            "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.10.33-rt32.43.el6rt.x86_64",
            "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.10.33-rt32.43.el6rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: x86_64: ptrace: sysret to non-canonical address"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...