Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2006-5753
Vulnerability from cvelistv5
Published
2007-01-30 19:00
Modified
2024-08-07 20:04
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the listxattr system call in Linux kernel, when a "bad inode" is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges via unknown vectors.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:04:55.441Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2007:0014", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0014.html" }, { "name": "oval:org.mitre.oval:def:9371", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9371" }, { "name": "24098", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24098" }, { "name": "22316", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22316" }, { "name": "24429", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24429" }, { "name": "24400", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24400" }, { "name": "SUSE-SA:2007:021", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_21_kernel.html" }, { "name": "FEDORA-2007-277", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://fedoranews.org/cms/node/2739" }, { "name": "MDKSA-2007:040", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:040" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm" }, { "name": "USN-416-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-416-1" }, { "name": "24100", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24100" }, { "name": "FEDORA-2007-291", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://fedoranews.org/cms/node/2740" }, { "name": "25226", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25226" }, { "name": "25683", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25683" }, { "name": "24206", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24206" }, { "name": "23997", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23997" }, { "name": "20070615 rPSA-2007-0124-1 kernel xen", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/471457" }, { "name": "24482", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24482" }, { "name": "SUSE-SA:2007:018", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_18_kernel.html" }, { "name": "DSA-1503", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1503" }, { "name": "33020", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/33020" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lkml.org/lkml/2007/1/3/150" }, { "name": "24547", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24547" }, { "name": "SUSE-SA:2007:030", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_30_kernel.html" }, { "name": "29058", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29058" }, { "name": "DSA-1304", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1304" }, { "name": "25714", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25714" }, { "name": "SUSE-SA:2007:035", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_35_kernel.html" }, { "name": "25691", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25691" }, { "name": "MDKSA-2007:060", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:060" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1106" }, { "name": "23955", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23955" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-01-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the listxattr system call in Linux kernel, when a \"bad inode\" is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2007:0014", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0014.html" }, { "name": "oval:org.mitre.oval:def:9371", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9371" }, { "name": "24098", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24098" }, { "name": "22316", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22316" }, { "name": "24429", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24429" }, { "name": "24400", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24400" }, { "name": "SUSE-SA:2007:021", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_21_kernel.html" }, { "name": "FEDORA-2007-277", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://fedoranews.org/cms/node/2739" }, { "name": "MDKSA-2007:040", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:040" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm" }, { "name": "USN-416-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-416-1" }, { "name": "24100", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24100" }, { "name": "FEDORA-2007-291", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://fedoranews.org/cms/node/2740" }, { "name": "25226", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25226" }, { "name": "25683", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25683" }, { "name": "24206", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24206" }, { "name": "23997", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23997" }, { "name": "20070615 rPSA-2007-0124-1 kernel xen", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/471457" }, { "name": "24482", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24482" }, { "name": "SUSE-SA:2007:018", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_18_kernel.html" }, { "name": "DSA-1503", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1503" }, { "name": "33020", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/33020" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lkml.org/lkml/2007/1/3/150" }, { "name": "24547", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24547" }, { "name": "SUSE-SA:2007:030", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_30_kernel.html" }, { "name": "29058", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29058" }, { "name": "DSA-1304", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1304" }, { "name": "25714", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25714" }, { "name": "SUSE-SA:2007:035", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_35_kernel.html" }, { "name": "25691", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25691" }, { "name": "MDKSA-2007:060", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:060" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1106" }, { "name": "23955", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23955" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2006-5753", "datePublished": "2007-01-30T19:00:00", "dateReserved": "2006-11-06T00:00:00", "dateUpdated": "2024-08-07T20:04:55.441Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2006-5753\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2007-01-30T19:28:00.000\",\"lastModified\":\"2024-11-21T00:20:24.757\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Unspecified vulnerability in the listxattr system call in Linux kernel, when a \\\"bad inode\\\" is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges via unknown vectors.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad no especificada en la llamada al sistema listxattr del n\u00facleo de Linux, cuando un \\\"inode malo\\\" (bad inode) est\u00e1 presente, permite a usuarios locales provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de datos) y posiblemente obtener privilegios mediante vectores no especificados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E3313D5-52E8-49B3-B145-170D9A26DA43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*\",\"matchCriteriaId\":\"F9440B25-D206-4914-9557-B5F030890DEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"E9933557-3BCA-4D92-AD4F-27758A0D3347\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*\",\"matchCriteriaId\":\"10A60552-15A5-4E95-B3CE-99A4B26260C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D74A418-50F0-42C0-ABBC-BBBE718FF025\"}]}]}],\"references\":[{\"url\":\"http://fedoranews.org/cms/node/2739\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://fedoranews.org/cms/node/2740\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lkml.org/lkml/2007/1/3/150\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://osvdb.org/33020\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23955\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23997\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/24098\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/24100\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/24206\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/24400\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/24429\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/24482\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/24547\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/25226\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/25683\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/25691\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/25714\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/29058\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1304\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1503\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:040\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:060\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_18_kernel.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_21_kernel.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_30_kernel.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_35_kernel.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0014.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/471457\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/22316\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-416-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1106\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9371\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://fedoranews.org/cms/node/2739\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://fedoranews.org/cms/node/2740\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lkml.org/lkml/2007/1/3/150\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/33020\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/23955\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/23997\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24098\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24100\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24206\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24400\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24429\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24482\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24547\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25226\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25683\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25691\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25714\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/29058\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1304\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1503\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:040\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:060\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_18_kernel.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_21_kernel.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_30_kernel.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_35_kernel.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/471457\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/22316\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-416-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1106\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9371\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat Enterprise Linux 2.1 is not vulnerable to this issue as it only affects x86_64 architectures.\\n\\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch at release.\",\"lastModified\":\"2007-10-18T00:00:00\"}]}}" } }
gsd-2006-5753
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
Unspecified vulnerability in the listxattr system call in Linux kernel, when a "bad inode" is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges via unknown vectors.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2006-5753", "description": "Unspecified vulnerability in the listxattr system call in Linux kernel, when a \"bad inode\" is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges via unknown vectors.", "id": "GSD-2006-5753", "references": [ "https://www.suse.com/security/cve/CVE-2006-5753.html", "https://www.debian.org/security/2008/dsa-1503", "https://www.debian.org/security/2007/dsa-1304", "https://access.redhat.com/errata/RHSA-2007:0014", "https://linux.oracle.com/cve/CVE-2006-5753.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2006-5753" ], "details": "Unspecified vulnerability in the listxattr system call in Linux kernel, when a \"bad inode\" is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges via unknown vectors.", "id": "GSD-2006-5753", "modified": "2023-12-13T01:19:56.232415Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2006-5753", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the listxattr system call in Linux kernel, when a \"bad inode\" is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://secunia.com/advisories/24098", "refsource": "MISC", "url": "http://secunia.com/advisories/24098" }, { "name": "http://secunia.com/advisories/25691", "refsource": "MISC", "url": "http://secunia.com/advisories/25691" }, { "name": "http://www.securityfocus.com/archive/1/471457", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/471457" }, { "name": "http://www.ubuntu.com/usn/usn-416-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/usn-416-1" }, { "name": "http://secunia.com/advisories/24100", "refsource": "MISC", "url": "http://secunia.com/advisories/24100" }, { "name": "http://secunia.com/advisories/24547", "refsource": "MISC", "url": "http://secunia.com/advisories/24547" }, { "name": "http://secunia.com/advisories/25226", "refsource": "MISC", "url": "http://secunia.com/advisories/25226" }, { "name": "http://secunia.com/advisories/25683", "refsource": "MISC", "url": "http://secunia.com/advisories/25683" }, { "name": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:040", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:040" }, { "name": "http://www.novell.com/linux/security/advisories/2007_18_kernel.html", "refsource": "MISC", "url": "http://www.novell.com/linux/security/advisories/2007_18_kernel.html" }, { "name": "http://www.novell.com/linux/security/advisories/2007_21_kernel.html", "refsource": "MISC", "url": "http://www.novell.com/linux/security/advisories/2007_21_kernel.html" }, { "name": "http://www.novell.com/linux/security/advisories/2007_30_kernel.html", "refsource": "MISC", "url": "http://www.novell.com/linux/security/advisories/2007_30_kernel.html" }, { "name": "http://www.novell.com/linux/security/advisories/2007_35_kernel.html", "refsource": "MISC", "url": "http://www.novell.com/linux/security/advisories/2007_35_kernel.html" }, { "name": "http://secunia.com/advisories/29058", "refsource": "MISC", "url": "http://secunia.com/advisories/29058" }, { "name": "http://www.debian.org/security/2008/dsa-1503", "refsource": "MISC", "url": "http://www.debian.org/security/2008/dsa-1503" }, { "name": "http://secunia.com/advisories/23997", "refsource": "MISC", "url": "http://secunia.com/advisories/23997" }, { "name": "http://secunia.com/advisories/24206", "refsource": "MISC", "url": "http://secunia.com/advisories/24206" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm", "refsource": "MISC", "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm" }, { "name": "http://secunia.com/advisories/24429", "refsource": "MISC", "url": "http://secunia.com/advisories/24429" }, { "name": "http://secunia.com/advisories/24482", "refsource": "MISC", "url": "http://secunia.com/advisories/24482" }, { "name": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:060", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:060" }, { "name": "http://secunia.com/advisories/25714", "refsource": "MISC", "url": "http://secunia.com/advisories/25714" }, { "name": "http://www.debian.org/security/2007/dsa-1304", "refsource": "MISC", "url": "http://www.debian.org/security/2007/dsa-1304" }, { "name": "http://secunia.com/advisories/23955", "refsource": "MISC", "url": "http://secunia.com/advisories/23955" }, { "name": "http://fedoranews.org/cms/node/2739", "refsource": "MISC", "url": "http://fedoranews.org/cms/node/2739" }, { "name": "http://fedoranews.org/cms/node/2740", "refsource": "MISC", "url": "http://fedoranews.org/cms/node/2740" }, { "name": "http://lkml.org/lkml/2007/1/3/150", "refsource": "MISC", "url": "http://lkml.org/lkml/2007/1/3/150" }, { "name": "http://osvdb.org/33020", "refsource": "MISC", "url": "http://osvdb.org/33020" }, { "name": "http://secunia.com/advisories/24400", "refsource": "MISC", "url": "http://secunia.com/advisories/24400" }, { "name": "http://www.redhat.com/support/errata/RHSA-2007-0014.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2007-0014.html" }, { "name": "http://www.securityfocus.com/bid/22316", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/22316" }, { "name": "https://issues.rpath.com/browse/RPL-1106", "refsource": "MISC", "url": "https://issues.rpath.com/browse/RPL-1106" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9371", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9371" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2006-5753" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Unspecified vulnerability in the listxattr system call in Linux kernel, when a \"bad inode\" is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2007:0014", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0014.html" }, { "name": "http://lkml.org/lkml/2007/1/3/150", "refsource": "MISC", "tags": [], "url": "http://lkml.org/lkml/2007/1/3/150" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm", "refsource": "CONFIRM", "tags": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm" }, { "name": "https://issues.rpath.com/browse/RPL-1106", "refsource": "CONFIRM", "tags": [], "url": "https://issues.rpath.com/browse/RPL-1106" }, { "name": "FEDORA-2007-277", "refsource": "FEDORA", "tags": [], "url": "http://fedoranews.org/cms/node/2739" }, { "name": "FEDORA-2007-291", "refsource": "FEDORA", "tags": [], "url": "http://fedoranews.org/cms/node/2740" }, { "name": "SUSE-SA:2007:018", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2007_18_kernel.html" }, { "name": "SUSE-SA:2007:021", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2007_21_kernel.html" }, { "name": "USN-416-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-416-1" }, { "name": "22316", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/22316" }, { "name": "23955", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23955" }, { "name": "23997", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23997" }, { "name": "24100", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/24100" }, { "name": "24098", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/24098" }, { "name": "24206", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/24206" }, { "name": "24400", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/24400" }, { "name": "24429", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/24429" }, { "name": "24482", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/24482" }, { "name": "24547", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/24547" }, { "name": "SUSE-SA:2007:030", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2007_30_kernel.html" }, { "name": "20070615 rPSA-2007-0124-1 kernel xen", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/471457" }, { "name": "DSA-1304", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2007/dsa-1304" }, { "name": "MDKSA-2007:040", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:040" }, { "name": "MDKSA-2007:060", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:060" }, { "name": "SUSE-SA:2007:035", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2007_35_kernel.html" }, { "name": "25683", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/25683" }, { "name": "25714", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/25714" }, { "name": "25691", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/25691" }, { "name": "25226", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/25226" }, { "name": "DSA-1503", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2008/dsa-1503" }, { "name": "29058", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/29058" }, { "name": "33020", "refsource": "OSVDB", "tags": [], "url": "http://osvdb.org/33020" }, { "name": "oval:org.mitre.oval:def:9371", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9371" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T02:16Z", "publishedDate": "2007-01-30T19:28Z" } } }
rhsa-2007_0014
Vulnerability from csaf_redhat
Published
2007-01-30 14:22
Modified
2024-11-22 01:36
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix several security issues in the Red Hat
Enterprise Linux 4 kernel are now available.
This security advisory has been rated as having important security impact
by the Red Hat Security Response Team.
Details
The Linux kernel handles the basic functions of the operating system.
These new kernel packages contain fixes for the security issues described
below:
* a flaw in the get_fdb_entries function of the network bridging support
that allowed a local user to cause a denial of service (crash) or allow a
potential privilege escalation (CVE-2006-5751, Important)
* an information leak in the _block_prepare_write function that allowed a
local user to read kernel memory (CVE-2006-4813, Important)
* an information leak in the copy_from_user() implementation on s390 and
s390x platforms that allowed a local user to read kernel memory
(CVE-2006-5174, Important)
* a flaw in the handling of /proc/net/ip6_flowlabel that allowed a local
user to cause a denial of service (infinite loop) (CVE-2006-5619, Important)
* a flaw in the AIO handling that allowed a local user to cause a denial of
service (panic) (CVE-2006-5754, Important)
* a race condition in the mincore system core that allowed a local user to
cause a denial of service (system hang) (CVE-2006-4814, Moderate)
* a flaw in the ELF handling on ia64 and sparc architectures which
triggered a cross-region memory mapping and allowed a local user to cause a
denial of service (CVE-2006-4538, Moderate)
* a flaw in the dev_queue_xmit function of the network subsystem that
allowed a local user to cause a denial of service (data corruption)
(CVE-2006-6535, Moderate)
* a flaw in the handling of CAPI messages over Bluetooth that allowed a
remote system to cause a denial of service or potential code execution.
This flaw is only exploitable if a privileged user establishes a connection
to a malicious remote device (CVE-2006-6106, Moderate)
* a flaw in the listxattr system call that allowed a local user to cause a
denial of service (data corruption) or potential privilege escalation. To
successfully exploit this flaw the existence of a bad inode is required
first (CVE-2006-5753, Moderate)
* a flaw in the __find_get_block_slow function that allowed a local
privileged user to cause a denial of service (CVE-2006-5757, Low)
* various flaws in the supported filesystems that allowed a local
privileged user to cause a denial of service (CVE-2006-5823, CVE-2006-6053,
CVE-2006-6054, CVE-2006-6056, Low)
In addition to the security issues described above, fixes for the following
bugs were included:
* initialization error of the tg3 driver with some BCM5703x network card
* a memory leak in the audit subsystem
* x86_64 nmi watchdog timeout is too short
* ext2/3 directory reads fail intermittently
Red Hat would like to thank Dmitriy Monakhov and Kostantin Khorenko for
reporting issues fixed in this erratum.
All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels
to the packages associated with their machine architecture and
configurations as listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues in the Red Hat\nEnterprise Linux 4 kernel are now available.\n\nThis security advisory has been rated as having important security impact\nby the Red Hat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues described\nbelow: \n\n* a flaw in the get_fdb_entries function of the network bridging support\nthat allowed a local user to cause a denial of service (crash) or allow a\npotential privilege escalation (CVE-2006-5751, Important)\n\n* an information leak in the _block_prepare_write function that allowed a\nlocal user to read kernel memory (CVE-2006-4813, Important)\n\n* an information leak in the copy_from_user() implementation on s390 and\ns390x platforms that allowed a local user to read kernel memory\n(CVE-2006-5174, Important)\n\n* a flaw in the handling of /proc/net/ip6_flowlabel that allowed a local\nuser to cause a denial of service (infinite loop) (CVE-2006-5619, Important)\n\n* a flaw in the AIO handling that allowed a local user to cause a denial of\n service (panic) (CVE-2006-5754, Important)\n\n* a race condition in the mincore system core that allowed a local user to\ncause a denial of service (system hang) (CVE-2006-4814, Moderate)\n\n* a flaw in the ELF handling on ia64 and sparc architectures which\ntriggered a cross-region memory mapping and allowed a local user to cause a\ndenial of service (CVE-2006-4538, Moderate)\n\n* a flaw in the dev_queue_xmit function of the network subsystem that\nallowed a local user to cause a denial of service (data corruption)\n(CVE-2006-6535, Moderate)\n\n* a flaw in the handling of CAPI messages over Bluetooth that allowed a\nremote system to cause a denial of service or potential code execution.\nThis flaw is only exploitable if a privileged user establishes a connection\nto a malicious remote device (CVE-2006-6106, Moderate)\n\n* a flaw in the listxattr system call that allowed a local user to cause a\ndenial of service (data corruption) or potential privilege escalation. To\nsuccessfully exploit this flaw the existence of a bad inode is required\nfirst (CVE-2006-5753, Moderate)\n\n* a flaw in the __find_get_block_slow function that allowed a local\nprivileged user to cause a denial of service (CVE-2006-5757, Low)\n\n* various flaws in the supported filesystems that allowed a local\nprivileged user to cause a denial of service (CVE-2006-5823, CVE-2006-6053,\nCVE-2006-6054, CVE-2006-6056, Low)\n\nIn addition to the security issues described above, fixes for the following\nbugs were included:\n\n* initialization error of the tg3 driver with some BCM5703x network card\n\n* a memory leak in the audit subsystem\n\n* x86_64 nmi watchdog timeout is too short\n\n* ext2/3 directory reads fail intermittently\n\nRed Hat would like to thank Dmitriy Monakhov and Kostantin Khorenko for\nreporting issues fixed in this erratum.\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their kernels\nto the packages associated with their machine architecture and\nconfigurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:0014", "url": "https://access.redhat.com/errata/RHSA-2007:0014" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "180663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=180663" }, { "category": "external", "summary": "205335", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=205335" }, { "category": "external", "summary": "206328", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=206328" }, { "category": "external", "summary": "207463", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=207463" }, { "category": "external", "summary": "209435", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=209435" }, { "category": "external", "summary": "212144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=212144" }, { "category": "external", "summary": "213214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=213214" }, { "category": "external", "summary": "213921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=213921" }, { "category": "external", "summary": "214288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=214288" }, { "category": "external", "summary": "216452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=216452" }, { "category": "external", "summary": "216958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=216958" }, { "category": "external", "summary": "217011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=217011" }, { "category": "external", "summary": "217021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=217021" }, { "category": "external", "summary": "217030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=217030" }, { "category": "external", "summary": "218602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=218602" }, { "category": "external", "summary": "220677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=220677" }, { "category": "external", "summary": "220971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=220971" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0014.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-22T01:36:04+00:00", "generator": { "date": "2024-11-22T01:36:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2007:0014", "initial_release_date": "2007-01-30T14:22:00+00:00", "revision_history": [ { "date": "2007-01-30T14:22:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-01-30T09:25:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:36:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-42.0.8.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-42.0.8.EL.noarch", "product_id": "kernel-doc-0:2.6.9-42.0.8.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-42.0.8.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-42.0.8.EL.i686", "product": { "name": "kernel-0:2.6.9-42.0.8.EL.i686", "product_id": "kernel-0:2.6.9-42.0.8.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.8.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.8.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.i686", "product_id": "kernel-devel-0:2.6.9-42.0.8.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.8.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-42.0.8.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-42.0.8.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.8.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-42.0.8.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-42.0.8.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-42.0.8.EL.i686", "product_id": "kernel-smp-0:2.6.9-42.0.8.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-42.0.8.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-42.0.8.EL.ia64", "product": { "name": "kernel-0:2.6.9-42.0.8.EL.ia64", "product_id": "kernel-0:2.6.9-42.0.8.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.8.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.8.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.ia64", "product_id": "kernel-devel-0:2.6.9-42.0.8.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.8.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "product": { "name": "kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "product_id": "kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-42.0.8.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.8.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "product_id": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-42.0.8.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-42.0.8.EL.src", "product": { "name": "kernel-0:2.6.9-42.0.8.EL.src", "product_id": "kernel-0:2.6.9-42.0.8.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.8.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-42.0.8.EL.x86_64", "product": { "name": "kernel-0:2.6.9-42.0.8.EL.x86_64", "product_id": "kernel-0:2.6.9-42.0.8.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.8.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.8.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-42.0.8.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "product": { "name": "kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "product_id": "kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-42.0.8.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.8.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "product_id": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-42.0.8.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-42.0.8.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-42.0.8.EL.ppc64", "product": { "name": "kernel-0:2.6.9-42.0.8.EL.ppc64", "product_id": "kernel-0:2.6.9-42.0.8.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.8.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.8.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "product": { "name": "kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "product_id": "kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-42.0.8.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.8.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "product_id": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-42.0.8.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.8.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.8.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.8.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-42.0.8.EL.s390x", "product": { "name": "kernel-0:2.6.9-42.0.8.EL.s390x", "product_id": "kernel-0:2.6.9-42.0.8.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.8.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.8.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.s390x", "product_id": "kernel-devel-0:2.6.9-42.0.8.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.8.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.8.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-42.0.8.EL.s390", "product": { "name": "kernel-0:2.6.9-42.0.8.EL.s390", "product_id": "kernel-0:2.6.9-42.0.8.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.8.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.8.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.s390", "product_id": "kernel-devel-0:2.6.9-42.0.8.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.8.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.8.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.8.EL.ia64" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.8.EL.s390" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.8.EL.s390x" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.8.EL.src" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-42.0.8.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-42.0.8.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.8.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.8.EL.src" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-42.0.8.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-42.0.8.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.8.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.8.EL.ia64" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.8.EL.s390" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.8.EL.s390x" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.8.EL.src" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-42.0.8.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-42.0.8.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.8.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.8.EL.ia64" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.8.EL.s390" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.8.EL.s390x" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.8.EL.src" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-42.0.8.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-42.0.8.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.8.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.8.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-4538", "discovery_date": "2006-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "289151" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.6.17 and earlier, when running on IA64 or SPARC platforms, allows local users to cause a denial of service (crash) via a malformed ELF file that triggers memory maps that cross region boundaries.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Local DoS with corrupted ELF", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4538" }, { "category": "external", "summary": "RHBZ#289151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=289151" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4538", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4538" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4538", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4538" } ], "release_date": "2006-08-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-30T14:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0014" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Local DoS with corrupted ELF" }, { "acknowledgments": [ { "names": [ "Dmitriy Monakhov" ] } ], "cve": "CVE-2006-4813", "discovery_date": "2006-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618206" } ], "notes": [ { "category": "description", "text": "The __block_prepare_write function in fs/buffer.c for Linux kernel 2.6.x before 2.6.13 does not properly clear buffers during certain error conditions, which allows local users to read portions of files that have been unlinked.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4813" }, { "category": "external", "summary": "RHBZ#1618206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618206" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4813", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4813" } ], "release_date": "2006-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-30T14:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0014" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-4814", "discovery_date": "2006-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "306971" } ], "notes": [ { "category": "description", "text": "The mincore function in the Linux kernel before 2.4.33.6 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel Race condition in mincore can cause \"ps -ef\" to hang", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4814" }, { "category": "external", "summary": "RHBZ#306971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=306971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4814", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4814" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4814", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4814" } ], "release_date": "2006-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-30T14:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0014" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel Race condition in mincore can cause \"ps -ef\" to hang" }, { "cve": "CVE-2006-5174", "discovery_date": "2006-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618209" } ], "notes": [ { "category": "description", "text": "The copy_from_user function in the uaccess code in Linux kernel 2.6 before 2.6.19-rc1, when running on s390, does not properly clear a kernel buffer, which allows local user space programs to read portions of kernel memory by \"appending to a file from a bad address,\" which triggers a fault that prevents the unused memory from being cleared in the kernel buffer.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5174" }, { "category": "external", "summary": "RHBZ#1618209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618209" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5174", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5174" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-30T14:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0014" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-5619", "discovery_date": "2006-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618220" } ], "notes": [ { "category": "description", "text": "The seqfile handling (ip6fl_get_n function in ip6_flowlabel.c) in Linux kernel 2.6 up to 2.6.18-stable allows local users to cause a denial of service (hang or oops) via unspecified manipulations that trigger an infinite loop while searching for flowlabels.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and are tracking it via bug 213214 for Red Hat Enterprise Linux 4:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=213214\n\nThis issue does not affect Red Hat Enterprise Linux 2.1 or 3", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5619" }, { "category": "external", "summary": "RHBZ#1618220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618220" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5619", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5619" } ], "release_date": "2006-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-30T14:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0014" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-5751", "discovery_date": "2006-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "216452" } ], "notes": [ { "category": "description", "text": "Integer overflow in the get_fdb_entries function in net/bridge/br_ioctl.c in the Linux kernel before 2.6.18.4 allows local users to execute arbitrary code via a large maxnum value in an ioctl request.", "title": "Vulnerability description" }, { "category": "summary", "text": "Linux kernel get_fdb_entries() integer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw does not affect the Linux kernel shipped with Red Hat Enterprise Linux 2.1 or 3.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5751" }, { "category": "external", "summary": "RHBZ#216452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=216452" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5751", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5751" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5751", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5751" } ], "release_date": "2006-11-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-30T14:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0014" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Linux kernel get_fdb_entries() integer overflow" }, { "cve": "CVE-2006-5753", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2006-12-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "306891" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the listxattr system call in Linux kernel, when a \"bad inode\" is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel listxattr syscall can corrupt user space programs", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 2.1 is not vulnerable to this issue as it only affects x86_64 architectures.\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch at release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5753" }, { "category": "external", "summary": "RHBZ#306891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=306891" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5753", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5753" } ], "release_date": "2007-01-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-30T14:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0014" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel listxattr syscall can corrupt user space programs" }, { "acknowledgments": [ { "names": [ "Kostantin Khorenko" ] } ], "cve": "CVE-2006-5754", "discovery_date": "2006-12-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618225" } ], "notes": [ { "category": "description", "text": "The aio_setup_ring function in Linux kernel does not properly initialize a variable, which allows local users to cause a denial of service (crash) via an unspecified error path that causes an incorrect free operation.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5754" }, { "category": "external", "summary": "RHBZ#1618225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5754", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5754" } ], "release_date": "2007-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-30T14:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0014" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-5757", "discovery_date": "2006-11-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618226" } ], "notes": [ { "category": "description", "text": "Race condition in the __find_get_block_slow function in the ISO9660 filesystem in Linux 2.6.18 and possibly other versions allows local users to cause a denial of service (infinite loop) by mounting a crafted ISO9660 filesystem containing malformed data structures.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5757" }, { "category": "external", "summary": "RHBZ#1618226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618226" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5757", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5757" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5757", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5757" } ], "release_date": "2006-11-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-30T14:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0014" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-5823", "discovery_date": "2006-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618227" } ], "notes": [ { "category": "description", "text": "The zlib_inflate function in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via a malformed filesystem that uses zlib compression that triggers memory corruption, as demonstrated using cramfs.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "The CVE-2006-5823 is about a corrupted cramfs (MOKB-07-11-2006) that can cause a memory corruption and so crash the machine.\n\nFor Red Hat Enterpise Linux 3 this issue is tracked via Bugzilla #216960 and for Red Hat Enterprise Linux 4 it is tracked via Bugzilla #216958.\n\nRed Hat Enterprise Linux 2.1 is not vulnerable to this issue.\n\nThis issue has been rated as having low impact, because root privileges or physical access to the machine are needed to mount a corrupted filesystem and crash the machine.\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5823" }, { "category": "external", "summary": "RHBZ#1618227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5823", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5823" } ], "release_date": "2006-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-30T14:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0014" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-6053", "discovery_date": "2006-11-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618233" } ], "notes": [ { "category": "description", "text": "The ext3fs_dirhash function in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via an ext3 stream with malformed data structures.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-6053" }, { "category": "external", "summary": "RHBZ#1618233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618233" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-6053", "url": "https://www.cve.org/CVERecord?id=CVE-2006-6053" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-6053", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6053" } ], "release_date": "2006-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-30T14:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0014" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-6054", "discovery_date": "2006-11-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618234" } ], "notes": [ { "category": "description", "text": "The ext2 file system code in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via an ext2 stream with malformed data structures that triggers an error in the ext2_check_page due to a length that is smaller than the minimum.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-6054" }, { "category": "external", "summary": "RHBZ#1618234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618234" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-6054", "url": "https://www.cve.org/CVERecord?id=CVE-2006-6054" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-6054", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6054" } ], "release_date": "2006-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-30T14:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0014" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-6056", "discovery_date": "2006-11-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618235" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.6.x up to 2.6.18 and possibly other versions, when SELinux hooks are enabled, allows local users to cause a denial of service (crash) via a malformed file stream that triggers a NULL pointer dereference in the superblock_doinit function, as demonstrated using an HFS filesystem image.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-6056" }, { "category": "external", "summary": "RHBZ#1618235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618235" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-6056", "url": "https://www.cve.org/CVERecord?id=CVE-2006-6056" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-6056", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6056" } ], "release_date": "2006-11-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-30T14:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0014" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-6106", "discovery_date": "2006-11-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618241" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in the cmtp_recv_interopmsg function in the Bluetooth driver (net/bluetooth/cmtp/capi.c) in the Linux kernel 2.4.22 up to 2.4.33.4 and 2.6.2 before 2.6.18.6, and 2.6.19.x, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via CAPI messages with a large value for the length of the (1) manu (manufacturer) or (2) serial (serial number) field.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it for Red Hat Enterprise Linux 4 via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=218602\n\nThis issue does not affect the version of the Linux kernel shipped with Red Hat Enterprise Linux 2.1 or 3.\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-6106" }, { "category": "external", "summary": "RHBZ#1618241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618241" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-6106", "url": "https://www.cve.org/CVERecord?id=CVE-2006-6106" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-6106", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6106" } ], "release_date": "2006-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-30T14:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0014" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "acknowledgments": [ { "names": [ "Kostantin Khorenko" ] } ], "cve": "CVE-2006-6535", "discovery_date": "2006-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618249" } ], "notes": [ { "category": "description", "text": "The dev_queue_xmit function in Linux kernel 2.6 can fail before calling the local_bh_disable function, which could lead to data corruption and \"node lockups.\" NOTE: it is not clear whether this issue is exploitable.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-6535" }, { "category": "external", "summary": "RHBZ#1618249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-6535", "url": "https://www.cve.org/CVERecord?id=CVE-2006-6535" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-6535", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6535" } ], "release_date": "2006-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-30T14:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-0:2.6.9-42.0.8.EL.src", "4AS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.8.EL.src", "4Desktop:kernel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-0:2.6.9-42.0.8.EL.src", "4ES:kernel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-0:2.6.9-42.0.8.EL.src", "4WS:kernel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.8.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.8.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.8.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0014" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
ghsa-p2rv-pwrw-64p2
Vulnerability from github
Published
2022-05-01 07:31
Modified
2022-05-01 07:31
Details
Unspecified vulnerability in the listxattr system call in Linux kernel, when a "bad inode" is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges via unknown vectors.
{ "affected": [], "aliases": [ "CVE-2006-5753" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2007-01-30T19:28:00Z", "severity": "HIGH" }, "details": "Unspecified vulnerability in the listxattr system call in Linux kernel, when a \"bad inode\" is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges via unknown vectors.", "id": "GHSA-p2rv-pwrw-64p2", "modified": "2022-05-01T07:31:24Z", "published": "2022-05-01T07:31:24Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5753" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2007:0014" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2006-5753" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=306891" }, { "type": "WEB", "url": "https://issues.rpath.com/browse/RPL-1106" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9371" }, { "type": "WEB", "url": "http://fedoranews.org/cms/node/2739" }, { "type": "WEB", "url": "http://fedoranews.org/cms/node/2740" }, { "type": "WEB", "url": "http://lkml.org/lkml/2007/1/3/150" }, { "type": "WEB", "url": "http://osvdb.org/33020" }, { "type": "WEB", "url": "http://secunia.com/advisories/23955" }, { "type": "WEB", "url": "http://secunia.com/advisories/23997" }, { "type": "WEB", "url": "http://secunia.com/advisories/24098" }, { "type": "WEB", "url": "http://secunia.com/advisories/24100" }, { "type": "WEB", "url": "http://secunia.com/advisories/24206" }, { "type": "WEB", "url": "http://secunia.com/advisories/24400" }, { "type": "WEB", "url": "http://secunia.com/advisories/24429" }, { "type": "WEB", "url": "http://secunia.com/advisories/24482" }, { "type": "WEB", "url": "http://secunia.com/advisories/24547" }, { "type": "WEB", "url": "http://secunia.com/advisories/25226" }, { "type": "WEB", "url": "http://secunia.com/advisories/25683" }, { "type": "WEB", "url": "http://secunia.com/advisories/25691" }, { "type": "WEB", "url": "http://secunia.com/advisories/25714" }, { "type": "WEB", "url": "http://secunia.com/advisories/29058" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm" }, { "type": "WEB", "url": "http://www.debian.org/security/2007/dsa-1304" }, { "type": "WEB", "url": "http://www.debian.org/security/2008/dsa-1503" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:040" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:060" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2007_18_kernel.html" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2007_21_kernel.html" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2007_30_kernel.html" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2007_35_kernel.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2007-0014.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/471457" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/22316" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-416-1" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.