Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2008-0600
Vulnerability from cvelistv5
Published
2008-02-12 20:00
Modified
2024-08-07 07:54
Severity ?
EPSS score ?
Summary
The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:54:21.972Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120263652322197\u0026w=2" }, { "name": "27801", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27801" }, { "name": "MDVSA-2008:043", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:043" }, { "name": "oval:org.mitre.oval:def:11358", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358" }, { "name": "28858", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28858" }, { "name": "DSA-1494", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1494" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432517" }, { "name": "USN-577-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-577-1" }, { "name": "SUSE-SA:2008:007", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html" }, { "name": "28875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28875" }, { "name": "28933", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28933" }, { "name": "FEDORA-2008-1629", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html" }, { "name": "ADV-2008-0487", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0487/references" }, { "name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120266353621139\u0026w=2" }, { "name": "SUSE-SA:2008:013", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html" }, { "name": "28889", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28889" }, { "name": "28937", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28937" }, { "name": "FEDORA-2008-1433", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html" }, { "name": "FEDORA-2008-1422", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html" }, { "name": "5092", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/5092" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052" }, { "name": "MDVSA-2008:044", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044" }, { "name": "29245", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29245" }, { "name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120264520431307\u0026w=2" }, { "name": "28896", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28896" }, { "name": "28925", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28925" }, { "name": "28835", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28835" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-2237" }, { "name": "FEDORA-2008-1423", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html" }, { "name": "20080212 rPSA-2008-0052-1 kernel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/488009/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0052" }, { "name": "28912", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28912" }, { "name": "SUSE-SA:2008:030", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html" }, { "name": "RHSA-2008:0129", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0129.html" }, { "name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120266328220808\u0026w=2" }, { "name": "1019393", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1019393" }, { "name": "30818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30818" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432229" }, { "name": "27704", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27704" }, { "name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120264773202422\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120263652322197\u0026w=2" }, { "name": "27801", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27801" }, { "name": "MDVSA-2008:043", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:043" }, { "name": "oval:org.mitre.oval:def:11358", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358" }, { "name": "28858", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28858" }, { "name": "DSA-1494", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1494" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432517" }, { "name": "USN-577-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-577-1" }, { "name": "SUSE-SA:2008:007", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html" }, { "name": "28875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28875" }, { "name": "28933", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28933" }, { "name": "FEDORA-2008-1629", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html" }, { "name": "ADV-2008-0487", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0487/references" }, { "name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120266353621139\u0026w=2" }, { "name": "SUSE-SA:2008:013", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html" }, { "name": "28889", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28889" }, { "name": "28937", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28937" }, { "name": "FEDORA-2008-1433", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html" }, { "name": "FEDORA-2008-1422", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html" }, { "name": "5092", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/5092" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052" }, { "name": "MDVSA-2008:044", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044" }, { "name": "29245", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29245" }, { "name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120264520431307\u0026w=2" }, { "name": "28896", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28896" }, { "name": "28925", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28925" }, { "name": "28835", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28835" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-2237" }, { "name": "FEDORA-2008-1423", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html" }, { "name": "20080212 rPSA-2008-0052-1 kernel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/488009/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0052" }, { "name": "28912", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28912" }, { "name": "SUSE-SA:2008:030", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html" }, { "name": "RHSA-2008:0129", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0129.html" }, { "name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120266328220808\u0026w=2" }, { "name": "1019393", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1019393" }, { "name": "30818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30818" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432229" }, { "name": "27704", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27704" }, { "name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120264773202422\u0026w=2" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-0600", "datePublished": "2008-02-12T20:00:00", "dateReserved": "2008-02-05T00:00:00", "dateUpdated": "2024-08-07T07:54:21.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2008-0600\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2008-02-12T21:00:00.000\",\"lastModified\":\"2024-11-21T00:42:28.770\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n vmsplice_to_pipe en el Kernel linux de la versi\u00f3n 2.6.17 a la 2.6.24.1 no valida ciertos espacios de memoria antes de referenciarlos, lo que permite a usuarios locales obtener privilegios de root/administrador a trav\u00e9s de argumentos manipulados en una llamada al sistema del tipo vmsplice. Esta es una vulnerabilidad distinta de CVE-2008-0009 y CVE-2008-0010.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E86E13B-EC92-47F3-94A9-DB515313011D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"980A6C7D-6175-4A44-8377-74AA7A9FD108\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C226902-04D9-4F32-866C-20225841ECF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"655DB612-AF49-4C17-AFB9-2E33EE8E0572\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE30F34-EE81-4E1E-BF9F-A7A36B78B897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1F65DF2-2794-47B7-9676-CCF150683CC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C6C01B-4CED-4F37-A415-0603496C27DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC47887B-5608-47BE-85EE-563864461915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF39E62B-EAB4-44B0-A421-2A71B7DD8341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"809264F1-763D-4A8F-B206-222332DD8732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A66ED53E-3139-4972-B027-D614BFFB8628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A3AB7A-1959-4A57-B83D-B2753C43649E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A60B265-5508-4EE0-980A-44BB0966FD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06F0037-DE20-4B4A-977F-BFCFAB026517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1817C772-D367-4ABE-B835-466D31A6DC89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C667B8E4-64EB-4A05-84FF-B2243DEF757D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9484B41A-DFB6-4481-80D8-440C711CEA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D373AF-DE6B-428E-9F0F-F1D220900A4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2975DF7-F916-456C-BF7C-2694559E5282\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"784EB96E-2FD3-4F77-8DB6-4D6C7A928946\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"338BB401-8831-4094-9186-2B3CFA5903D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F6269B-5F6B-4413-B14D-7AE5442E4CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189D1246-F975-4411-A58B-343ED90485FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B914F7F-C6BD-4527-B1E9-7FD1E337A18C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"179147E4-5247-451D-9409-545D661BC158\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ED4E9DD-DDAD-46A8-9AD2-9CAE406F7575\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D97ED16-D6B7-4445-889C-4D6DE2EDC49A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C2D5D4-9A4B-4CDF-8D71-D22EB5E97D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFFB2843-A867-48EC-97D7-B106C7BBAED0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6554469E-F6AE-4EB0-880E-CBFD196FEE31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C20367B0-F722-4442-8B59-ABB0FEDB8CC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6940324-0383-4510-BA55-770E0A6B80B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB1E1A8B-6FA1-45AD-B034-EC34884527DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E3313D5-52E8-49B3-B145-170D9A26DA43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D3A5FD5-4C42-4B00-8473-D5650FAED9C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"480F035A-A59D-4113-A246-DF108BB2F591\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30D39E29-B2A0-4075-84AF-994C27AB0A68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19879317-B067-45DA-B497-21EBDDDC2521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D220C745-28AD-4D04-B2D2-A090D229206E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4AF8895-7BF8-458E-B2BB-68699AABC023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA768A9D-6C63-405E-9D14-5D68F8E93A91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF495E58-DA6C-402D-B381-4929CB8A502B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A591301C-C30F-44AC-90F0-709A18AA96E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7D2606B-00A6-4FA3-A00D-B1E8A80B947C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"610A93BB-70E3-4BF1-83E8-8A7388477F44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"821BD11F-3C6A-4424-BC9B-DFD786248B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50B422D1-6C6E-4359-A169-3EED78A1CF40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8CBD2D9-3765-40B2-A056-D71BE750CC01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F4D967-ED04-42EA-8B3E-36301D39D651\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C498EE89-7F07-4B1E-90E6-5897E6B04670\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*\",\"matchCriteriaId\":\"708656AF-92AE-4EAF-AF19-F457DB04ADB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B263AB8-74A4-4C73-915C-A02724C24B45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*\",\"matchCriteriaId\":\"A96D739B-9E8B-4D2F-9DED-4C9B313473CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ACDEFEE-B946-4232-8BD5-A9F7AA84ED85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"247E13CB-9B11-4B64-80AD-C0F8482CCC0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"903FE5D3-A9FB-466D-833B-448233BB0803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"958EDC43-0848-4D93-9D07-6A085A5940B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD35F21D-0A28-4C14-BCF5-8EDA760701C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AAD8BE9-A05B-40E8-80DF-0B2878968BD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2F19064-CFBF-4B3C-A0A1-CE62265CD592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB759752-DC19-4750-838B-056063EFDC5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615BDD1D-36AA-4976-909B-F0F66BF1090C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"D123AAFE-3F17-45C4-9382-BA392FD022C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE8A26D6-1BDA-45F0-8F7C-F95986050E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F320FA9F-C13D-4AA3-B838-A0E5D63E6A29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B179CF1D-084D-4B21-956F-E55AC6BDE026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F1B4877-286A-44B5-9C5C-0403F75B2BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"432CA976-6EFA-4D34-B5EA-CD772D067F93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E476195-657E-416E-BC16-44A18B06A133\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFF566DA-0F04-48DA-AA40-565979C55328\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E249774-CE05-43D5-A5A3-7CCE24BB2AD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D42BA44-C69B-4170-9867-CABF93CA9BD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5140380C-71BD-464F-AE53-1814C2653056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B18EC0A7-8616-4039-B98B-E1216E035B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22FB141B-FA2A-435D-8937-83FC0669CB20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C59131C8-F66A-4380-9F6E-3FC14C7C8562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5421616-4BF5-4269-8996-C3D2BA6AE2A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23FC6CE2-8717-4558-A309-A441D322F00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"311BE336-7BB2-47C0-AED5-3DEA706C206F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AAC2E9D-0E82-4866-9046-ADD448418198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67F2047A-5F17-4B59-9075-41A5DC5C1CD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13673DF5-09B1-40C8-AC54-A447DE8AB01E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A12DE15-E192-4B90-ADB7-A886B3746DD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF6588E7-F4FA-40F5-8945-FC7B6094376E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52152F5A-1833-4490-A373-9C547B90B0F8\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=120263652322197\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=120264520431307\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=120264773202422\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=120266328220808\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=120266353621139\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://secunia.com/advisories/28835\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28858\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28875\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28889\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28896\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28912\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28925\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28933\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28937\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/29245\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/30818\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1019393\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2008-0052\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1494\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:043\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:044\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0129.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/488009/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/27704\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/27801\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-577-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0487/references\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=432229\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=432517\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://issues.rpath.com/browse/RPL-2237\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.exploit-db.com/exploits/5092\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=120263652322197\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=120264520431307\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=120264773202422\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=120266328220808\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=120266353621139\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://secunia.com/advisories/28835\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28858\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28875\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28889\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28896\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28912\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28925\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28933\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28937\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/29245\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30818\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1019393\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2008-0052\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1494\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:043\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:044\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0129.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/488009/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/27704\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/27801\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-577-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0487/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=432229\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=432517\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-2237\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.exploit-db.com/exploits/5092\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4. Updated kernel packages are available to correct this issue for Red Hat Enterprise Linux 5:\\nhttps://rhn.redhat.com/errata/RHSA-2008-0129.html\",\"lastModified\":\"2008-02-13T00:00:00\"}]}}" } }
ghsa-vv62-ccxv-738x
Vulnerability from github
Published
2022-05-01 23:31
Modified
2022-05-01 23:31
Details
The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.
{ "affected": [], "aliases": [ "CVE-2008-0600" ], "database_specific": { "cwe_ids": [ "CWE-94" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-02-12T21:00:00Z", "severity": "HIGH" }, "details": "The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.", "id": "GHSA-vv62-ccxv-738x", "modified": "2022-05-01T23:31:47Z", "published": "2022-05-01T23:31:47Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0600" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2008:0129" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2008-0600" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432229" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432251" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432517" }, { "type": "WEB", "url": "https://issues.rpath.com/browse/RPL-2237" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/5092" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html" }, { "type": "WEB", "url": "http://marc.info/?l=linux-kernel\u0026m=120263652322197\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=linux-kernel\u0026m=120264520431307\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=linux-kernel\u0026m=120264773202422\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=linux-kernel\u0026m=120266328220808\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=linux-kernel\u0026m=120266353621139\u0026w=2" }, { "type": "WEB", "url": "http://secunia.com/advisories/28835" }, { "type": "WEB", "url": "http://secunia.com/advisories/28858" }, { "type": "WEB", "url": "http://secunia.com/advisories/28875" }, { "type": "WEB", "url": "http://secunia.com/advisories/28889" }, { "type": "WEB", "url": "http://secunia.com/advisories/28896" }, { "type": "WEB", "url": "http://secunia.com/advisories/28912" }, { "type": "WEB", "url": "http://secunia.com/advisories/28925" }, { "type": "WEB", "url": "http://secunia.com/advisories/28933" }, { "type": "WEB", "url": "http://secunia.com/advisories/28937" }, { "type": "WEB", "url": "http://secunia.com/advisories/29245" }, { "type": "WEB", "url": "http://secunia.com/advisories/30818" }, { "type": "WEB", "url": "http://securitytracker.com/id?1019393" }, { "type": "WEB", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0052" }, { "type": "WEB", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052" }, { "type": "WEB", "url": "http://www.debian.org/security/2008/dsa-1494" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:043" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0129.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/488009/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/27704" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/27801" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-577-1" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/0487/references" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2008-0600
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2008-0600", "description": "The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.", "id": "GSD-2008-0600", "references": [ "https://www.suse.com/security/cve/CVE-2008-0600.html", "https://www.debian.org/security/2008/dsa-1494", "https://access.redhat.com/errata/RHSA-2008:0129", "https://linux.oracle.com/cve/CVE-2008-0600.html", "https://packetstormsecurity.com/files/cve/CVE-2008-0600" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2008-0600" ], "details": "The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.", "id": "GSD-2008-0600", "modified": "2023-12-13T01:22:58.331465Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-0600", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://secunia.com/advisories/28835", "refsource": "MISC", "url": "http://secunia.com/advisories/28835" }, { "name": "http://secunia.com/advisories/28875", "refsource": "MISC", "url": "http://secunia.com/advisories/28875" }, { "name": "http://secunia.com/advisories/28896", "refsource": "MISC", "url": "http://secunia.com/advisories/28896" }, { "name": "http://www.debian.org/security/2008/dsa-1494", "refsource": "MISC", "url": "http://www.debian.org/security/2008/dsa-1494" }, { "name": "http://www.securityfocus.com/bid/27704", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/27704" }, { "name": "http://www.vupen.com/english/advisories/2008/0487/references", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2008/0487/references" }, { "name": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html", "refsource": "MISC", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html" }, { "name": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html", "refsource": "MISC", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html" }, { "name": "http://marc.info/?l=linux-kernel\u0026m=120263652322197\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=linux-kernel\u0026m=120263652322197\u0026w=2" }, { "name": "http://marc.info/?l=linux-kernel\u0026m=120264520431307\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=linux-kernel\u0026m=120264520431307\u0026w=2" }, { "name": "http://marc.info/?l=linux-kernel\u0026m=120264773202422\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=linux-kernel\u0026m=120264773202422\u0026w=2" }, { "name": "http://marc.info/?l=linux-kernel\u0026m=120266328220808\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=linux-kernel\u0026m=120266328220808\u0026w=2" }, { "name": "http://marc.info/?l=linux-kernel\u0026m=120266353621139\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=linux-kernel\u0026m=120266353621139\u0026w=2" }, { "name": "http://secunia.com/advisories/28858", "refsource": "MISC", "url": "http://secunia.com/advisories/28858" }, { "name": "http://secunia.com/advisories/28889", "refsource": "MISC", "url": "http://secunia.com/advisories/28889" }, { "name": "http://secunia.com/advisories/28912", "refsource": "MISC", "url": "http://secunia.com/advisories/28912" }, { "name": "http://secunia.com/advisories/28925", "refsource": "MISC", "url": "http://secunia.com/advisories/28925" }, { "name": "http://secunia.com/advisories/28933", "refsource": "MISC", "url": "http://secunia.com/advisories/28933" }, { "name": "http://secunia.com/advisories/28937", "refsource": "MISC", "url": "http://secunia.com/advisories/28937" }, { "name": "http://secunia.com/advisories/29245", "refsource": "MISC", "url": "http://secunia.com/advisories/29245" }, { "name": "http://secunia.com/advisories/30818", "refsource": "MISC", "url": "http://secunia.com/advisories/30818" }, { "name": "http://securitytracker.com/id?1019393", "refsource": "MISC", "url": "http://securitytracker.com/id?1019393" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2008-0052", "refsource": "MISC", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0052" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052", "refsource": "MISC", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:043", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:043" }, { "name": "http://www.redhat.com/support/errata/RHSA-2008-0129.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2008-0129.html" }, { "name": "http://www.securityfocus.com/archive/1/488009/100/0/threaded", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/488009/100/0/threaded" }, { "name": "http://www.securityfocus.com/bid/27801", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/27801" }, { "name": "http://www.ubuntu.com/usn/usn-577-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/usn-577-1" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=432229", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432229" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=432517", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432517" }, { "name": "https://issues.rpath.com/browse/RPL-2237", "refsource": "MISC", "url": "https://issues.rpath.com/browse/RPL-2237" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358" }, { "name": "https://www.exploit-db.com/exploits/5092", "refsource": "MISC", "url": "https://www.exploit-db.com/exploits/5092" }, { "name": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html", "refsource": "MISC", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html" }, { "name": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html", "refsource": "MISC", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-0600" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-94" } ] } ] }, "references": { "reference_data": [ { "name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit", "refsource": "MLIST", "tags": [ "Exploit" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120264773202422\u0026w=2" }, { "name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit", "refsource": "MLIST", "tags": [ "Exploit" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120263652322197\u0026w=2" }, { "name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit", "refsource": "MLIST", "tags": [ "Exploit" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120264520431307\u0026w=2" }, { "name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit", "refsource": "MLIST", "tags": [ "Exploit" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120266328220808\u0026w=2" }, { "name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit", "refsource": "MLIST", "tags": [ "Exploit" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120266353621139\u0026w=2" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2008-0052", "refsource": "CONFIRM", "tags": [], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0052" }, { "name": "DSA-1494", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2008/dsa-1494" }, { "name": "FEDORA-2008-1422", "refsource": "FEDORA", "tags": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html" }, { "name": "FEDORA-2008-1423", "refsource": "FEDORA", "tags": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html" }, { "name": "MDVSA-2008:043", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:043" }, { "name": "MDVSA-2008:044", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044" }, { "name": "RHSA-2008:0129", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0129.html" }, { "name": "SUSE-SA:2008:007", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html" }, { "name": "USN-577-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-577-1" }, { "name": "27704", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/27704" }, { "name": "28835", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/28835" }, { "name": "28858", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/28858" }, { "name": "28875", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/28875" }, { "name": "28896", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/28896" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052", "refsource": "CONFIRM", "tags": [], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=432229", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432229" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=432517", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432517" }, { "name": "https://issues.rpath.com/browse/RPL-2237", "refsource": "CONFIRM", "tags": [], "url": "https://issues.rpath.com/browse/RPL-2237" }, { "name": "FEDORA-2008-1433", "refsource": "FEDORA", "tags": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html" }, { "name": "FEDORA-2008-1629", "refsource": "FEDORA", "tags": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html" }, { "name": "1019393", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1019393" }, { "name": "28889", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/28889" }, { "name": "28912", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/28912" }, { "name": "28925", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/28925" }, { "name": "28933", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/28933" }, { "name": "28937", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/28937" }, { "name": "SUSE-SA:2008:013", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html" }, { "name": "27801", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/27801" }, { "name": "29245", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/29245" }, { "name": "30818", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/30818" }, { "name": "SUSE-SA:2008:030", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html" }, { "name": "ADV-2008-0487", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/0487/references" }, { "name": "5092", "refsource": "EXPLOIT-DB", "tags": [], "url": "https://www.exploit-db.com/exploits/5092" }, { "name": "oval:org.mitre.oval:def:11358", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358" }, { "name": "20080212 rPSA-2008-0052-1 kernel", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/488009/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T02:18Z", "publishedDate": "2008-02-12T21:00Z" } } }
fkie_cve-2008-0600
Vulnerability from fkie_nvd
Published
2008-02-12 21:00
Modified
2024-11-21 00:42
Severity ?
Summary
The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "9E86E13B-EC92-47F3-94A9-DB515313011D", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*", "matchCriteriaId": "980A6C7D-6175-4A44-8377-74AA7A9FD108", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*", "matchCriteriaId": "5C226902-04D9-4F32-866C-20225841ECF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*", "matchCriteriaId": "C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*", "matchCriteriaId": "655DB612-AF49-4C17-AFB9-2E33EE8E0572", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*", "matchCriteriaId": "7EE30F34-EE81-4E1E-BF9F-A7A36B78B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*", "matchCriteriaId": "E1F65DF2-2794-47B7-9676-CCF150683CC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "6555D45B-D3B3-4455-AB1E-E513F9FB6139", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*", "matchCriteriaId": "4FA5E262-7825-496F-AA72-0AD6DE6F3C78", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*", "matchCriteriaId": "56C6C01B-4CED-4F37-A415-0603496C27DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*", "matchCriteriaId": "9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*", "matchCriteriaId": "FE3ACE7A-A600-4ABB-B988-5D59D626DC0B", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*", "matchCriteriaId": "2F839622-3DE1-4A16-8BD2-5FA2CBF014D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*", "matchCriteriaId": "DC47887B-5608-47BE-85EE-563864461915", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*", "matchCriteriaId": "AF39E62B-EAB4-44B0-A421-2A71B7DD8341", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*", "matchCriteriaId": "809264F1-763D-4A8F-B206-222332DD8732", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*", "matchCriteriaId": "A66ED53E-3139-4972-B027-D614BFFB8628", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*", "matchCriteriaId": "85A3AB7A-1959-4A57-B83D-B2753C43649E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*", "matchCriteriaId": "B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*", "matchCriteriaId": "4A60B265-5508-4EE0-980A-44BB0966FD7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "C06F0037-DE20-4B4A-977F-BFCFAB026517", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*", "matchCriteriaId": "1817C772-D367-4ABE-B835-466D31A6DC89", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*", "matchCriteriaId": "C667B8E4-64EB-4A05-84FF-B2243DEF757D", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*", "matchCriteriaId": "9484B41A-DFB6-4481-80D8-440C711CEA53", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*", "matchCriteriaId": "53D373AF-DE6B-428E-9F0F-F1D220900A4D", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*", "matchCriteriaId": "F2975DF7-F916-456C-BF7C-2694559E5282", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*", "matchCriteriaId": "6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*", "matchCriteriaId": "784EB96E-2FD3-4F77-8DB6-4D6C7A928946", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "D08CBC56-C820-4513-ABEC-1ABB3EFC3A15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "338BB401-8831-4094-9186-2B3CFA5903D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*", "matchCriteriaId": "1E32E6BA-AFEF-44A8-B230-87DD043BB222", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*", "matchCriteriaId": "F69E575B-BD1A-4E50-8D6F-131D5E08058E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*", "matchCriteriaId": "20F6269B-5F6B-4413-B14D-7AE5442E4CCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*", "matchCriteriaId": "189D1246-F975-4411-A58B-343ED90485FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*", "matchCriteriaId": "1B914F7F-C6BD-4527-B1E9-7FD1E337A18C", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*", "matchCriteriaId": "82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "179147E4-5247-451D-9409-545D661BC158", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*", "matchCriteriaId": "4ED4E9DD-DDAD-46A8-9AD2-9CAE406F7575", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*", "matchCriteriaId": "8D97ED16-D6B7-4445-889C-4D6DE2EDC49A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*", "matchCriteriaId": "B2C2D5D4-9A4B-4CDF-8D71-D22EB5E97D5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*", "matchCriteriaId": "DFFB2843-A867-48EC-97D7-B106C7BBAED0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "6554469E-F6AE-4EB0-880E-CBFD196FEE31", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "C20367B0-F722-4442-8B59-ABB0FEDB8CC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "C6940324-0383-4510-BA55-770E0A6B80B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*", "matchCriteriaId": "FB1E1A8B-6FA1-45AD-B034-EC34884527DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "1E3313D5-52E8-49B3-B145-170D9A26DA43", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*", "matchCriteriaId": "3D3A5FD5-4C42-4B00-8473-D5650FAED9C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*", "matchCriteriaId": "480F035A-A59D-4113-A246-DF108BB2F591", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*", "matchCriteriaId": "30D39E29-B2A0-4075-84AF-994C27AB0A68", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*", "matchCriteriaId": "19879317-B067-45DA-B497-21EBDDDC2521", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*", "matchCriteriaId": "D220C745-28AD-4D04-B2D2-A090D229206E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*", "matchCriteriaId": "8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*", "matchCriteriaId": "E4AF8895-7BF8-458E-B2BB-68699AABC023", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*", "matchCriteriaId": "CA768A9D-6C63-405E-9D14-5D68F8E93A91", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*", "matchCriteriaId": "FF495E58-DA6C-402D-B381-4929CB8A502B", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*", "matchCriteriaId": "AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*", "matchCriteriaId": "A591301C-C30F-44AC-90F0-709A18AA96E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*", "matchCriteriaId": "F7D2606B-00A6-4FA3-A00D-B1E8A80B947C", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*", "matchCriteriaId": "610A93BB-70E3-4BF1-83E8-8A7388477F44", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*", "matchCriteriaId": "821BD11F-3C6A-4424-BC9B-DFD786248B07", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*", "matchCriteriaId": "50B422D1-6C6E-4359-A169-3EED78A1CF40", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*", "matchCriteriaId": "C8CBD2D9-3765-40B2-A056-D71BE750CC01", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*", "matchCriteriaId": "A8F4D967-ED04-42EA-8B3E-36301D39D651", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*", "matchCriteriaId": "C498EE89-7F07-4B1E-90E6-5897E6B04670", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*", "matchCriteriaId": "708656AF-92AE-4EAF-AF19-F457DB04ADB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*", "matchCriteriaId": "3B263AB8-74A4-4C73-915C-A02724C24B45", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*", "matchCriteriaId": "A96D739B-9E8B-4D2F-9DED-4C9B313473CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*", "matchCriteriaId": "4ACDEFEE-B946-4232-8BD5-A9F7AA84ED85", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*", "matchCriteriaId": "247E13CB-9B11-4B64-80AD-C0F8482CCC0E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*", "matchCriteriaId": "903FE5D3-A9FB-466D-833B-448233BB0803", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*", "matchCriteriaId": "958EDC43-0848-4D93-9D07-6A085A5940B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*", "matchCriteriaId": "AD35F21D-0A28-4C14-BCF5-8EDA760701C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*", "matchCriteriaId": "3AAD8BE9-A05B-40E8-80DF-0B2878968BD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "A2F19064-CFBF-4B3C-A0A1-CE62265CD592", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "AB759752-DC19-4750-838B-056063EFDC5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*", "matchCriteriaId": "615BDD1D-36AA-4976-909B-F0F66BF1090C", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*", "matchCriteriaId": "D123AAFE-3F17-45C4-9382-BA392FD022C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*", "matchCriteriaId": "EE8A26D6-1BDA-45F0-8F7C-F95986050E32", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*", "matchCriteriaId": "F320FA9F-C13D-4AA3-B838-A0E5D63E6A29", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*", "matchCriteriaId": "B179CF1D-084D-4B21-956F-E55AC6BDE026", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*", "matchCriteriaId": "6F1B4877-286A-44B5-9C5C-0403F75B2BAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*", "matchCriteriaId": "432CA976-6EFA-4D34-B5EA-CD772D067F93", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*", "matchCriteriaId": "6E476195-657E-416E-BC16-44A18B06A133", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*", "matchCriteriaId": "DFF566DA-0F04-48DA-AA40-565979C55328", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*", "matchCriteriaId": "5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*", "matchCriteriaId": "0E249774-CE05-43D5-A5A3-7CCE24BB2AD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*", "matchCriteriaId": "8D42BA44-C69B-4170-9867-CABF93CA9BD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "5140380C-71BD-464F-AE53-1814C2653056", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*", "matchCriteriaId": "B18EC0A7-8616-4039-B98B-E1216E035B05", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*", "matchCriteriaId": "22FB141B-FA2A-435D-8937-83FC0669CB20", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*", "matchCriteriaId": "C59131C8-F66A-4380-9F6E-3FC14C7C8562", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*", "matchCriteriaId": "A5421616-4BF5-4269-8996-C3D2BA6AE2A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*", "matchCriteriaId": "23FC6CE2-8717-4558-A309-A441D322F00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*", "matchCriteriaId": "311BE336-7BB2-47C0-AED5-3DEA706C206F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*", "matchCriteriaId": "5AAC2E9D-0E82-4866-9046-ADD448418198", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*", "matchCriteriaId": "67F2047A-5F17-4B59-9075-41A5DC5C1CD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*", "matchCriteriaId": "13673DF5-09B1-40C8-AC54-A447DE8AB01E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*", "matchCriteriaId": "9A12DE15-E192-4B90-ADB7-A886B3746DD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*", "matchCriteriaId": "FF6588E7-F4FA-40F5-8945-FC7B6094376E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "52152F5A-1833-4490-A373-9C547B90B0F8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010." }, { "lang": "es", "value": "La funci\u00f3n vmsplice_to_pipe en el Kernel linux de la versi\u00f3n 2.6.17 a la 2.6.24.1 no valida ciertos espacios de memoria antes de referenciarlos, lo que permite a usuarios locales obtener privilegios de root/administrador a trav\u00e9s de argumentos manipulados en una llamada al sistema del tipo vmsplice. Esta es una vulnerabilidad distinta de CVE-2008-0009 y CVE-2008-0010." } ], "id": "CVE-2008-0600", "lastModified": "2024-11-21T00:42:28.770", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-02-12T21:00:00.000", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120263652322197\u0026w=2" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120264520431307\u0026w=2" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120264773202422\u0026w=2" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120266328220808\u0026w=2" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120266353621139\u0026w=2" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/28835" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/28858" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/28875" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/28889" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/28896" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/28912" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/28925" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/28933" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/28937" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/29245" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/30818" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1019393" }, { "source": "secalert@redhat.com", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0052" }, { "source": "secalert@redhat.com", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2008/dsa-1494" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:043" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2008-0129.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/488009/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/27704" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/27801" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/usn-577-1" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2008/0487/references" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432229" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432517" }, { "source": "secalert@redhat.com", "url": "https://issues.rpath.com/browse/RPL-2237" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358" }, { "source": "secalert@redhat.com", "url": "https://www.exploit-db.com/exploits/5092" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120263652322197\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120264520431307\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120264773202422\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120266328220808\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://marc.info/?l=linux-kernel\u0026m=120266353621139\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28835" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28896" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28912" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28925" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28933" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/30818" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1019393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1494" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:043" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0129.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/488009/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/27704" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/27801" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-577-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0487/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432229" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432517" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-2237" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/5092" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html" } ], "sourceIdentifier": "secalert@redhat.com", "vendorComments": [ { "comment": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4. Updated kernel packages are available to correct this issue for Red Hat Enterprise Linux 5:\nhttps://rhn.redhat.com/errata/RHSA-2008-0129.html", "lastModified": "2008-02-13T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
rhsa-2008_0129
Vulnerability from csaf_redhat
Published
2008-02-12 16:53
Modified
2024-11-22 01:48
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix a security issue are now available for Red
Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
A flaw was found in vmsplice. An unprivileged local user could use this
flaw to gain root privileges. (CVE-2008-0600)
Red Hat is aware that a public exploit for this issue is available. This
issue did not affect the Linux kernels distributed with Red Hat Enterprise
Linux 2.1, 3, or 4.
Red Hat Enterprise Linux 5 users are advised to upgrade to these updated
packages, which contain a backported patch to resolve this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix a security issue are now available for Red\nHat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nA flaw was found in vmsplice. An unprivileged local user could use this\nflaw to gain root privileges. (CVE-2008-0600)\n\nRed Hat is aware that a public exploit for this issue is available. This\nissue did not affect the Linux kernels distributed with Red Hat Enterprise\nLinux 2.1, 3, or 4.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these updated\npackages, which contain a backported patch to resolve this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0129", "url": "https://access.redhat.com/errata/RHSA-2008:0129" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "432251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432251" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0129.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-22T01:48:15+00:00", "generator": { "date": "2024-11-22T01:48:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0129", "initial_release_date": "2008-02-12T16:53:00+00:00", "revision_history": [ { "date": "2008-02-12T16:53:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-02-12T11:54:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:48:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-xen-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-debug-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-devel-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-PAE-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.13.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.13.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.i386", "product_id": "kernel-headers-0:2.6.18-53.1.13.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch", "product_id": "kernel-doc-0:2.6.18-53.1.13.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-53.1.13.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.13.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-53.1.13.el5.src", "product": { "name": "kernel-0:2.6.18-53.1.13.el5.src", "product_id": "kernel-0:2.6.18-53.1.13.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc", "product_id": "kernel-headers-0:2.6.18-53.1.13.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-xen-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-debug-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-devel-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-headers-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.13.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-debug-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-devel-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-headers-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.src" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-53.1.13.el5.noarch", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.src" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-53.1.13.el5.noarch", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-0600", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2008-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "432251" } ], "notes": [ { "category": "description", "text": "The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel vmsplice_to_pipe flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-0:2.6.18-53.1.13.el5.src", "5Client:kernel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-0:2.6.18-53.1.13.el5.src", "5Server:kernel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0600" }, { "category": "external", "summary": "RHBZ#432251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432251" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0600", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0600" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0600", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0600" } ], "release_date": "2008-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-12T16:53:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-0:2.6.18-53.1.13.el5.src", "5Client:kernel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-0:2.6.18-53.1.13.el5.src", "5Server:kernel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2008:0129" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-0:2.6.18-53.1.13.el5.src", "5Client:kernel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-0:2.6.18-53.1.13.el5.src", "5Server:kernel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel vmsplice_to_pipe flaw" } ] }
rhsa-2008:0129
Vulnerability from csaf_redhat
Published
2008-02-12 16:53
Modified
2024-11-22 01:48
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix a security issue are now available for Red
Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
A flaw was found in vmsplice. An unprivileged local user could use this
flaw to gain root privileges. (CVE-2008-0600)
Red Hat is aware that a public exploit for this issue is available. This
issue did not affect the Linux kernels distributed with Red Hat Enterprise
Linux 2.1, 3, or 4.
Red Hat Enterprise Linux 5 users are advised to upgrade to these updated
packages, which contain a backported patch to resolve this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix a security issue are now available for Red\nHat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nA flaw was found in vmsplice. An unprivileged local user could use this\nflaw to gain root privileges. (CVE-2008-0600)\n\nRed Hat is aware that a public exploit for this issue is available. This\nissue did not affect the Linux kernels distributed with Red Hat Enterprise\nLinux 2.1, 3, or 4.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these updated\npackages, which contain a backported patch to resolve this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0129", "url": "https://access.redhat.com/errata/RHSA-2008:0129" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "432251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432251" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0129.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-22T01:48:15+00:00", "generator": { "date": "2024-11-22T01:48:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0129", "initial_release_date": "2008-02-12T16:53:00+00:00", "revision_history": [ { "date": "2008-02-12T16:53:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-02-12T11:54:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:48:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-xen-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-debug-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-devel-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-PAE-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.13.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.13.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.i386", "product_id": "kernel-headers-0:2.6.18-53.1.13.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch", "product_id": "kernel-doc-0:2.6.18-53.1.13.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-53.1.13.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.13.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-53.1.13.el5.src", "product": { "name": "kernel-0:2.6.18-53.1.13.el5.src", "product_id": "kernel-0:2.6.18-53.1.13.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc", "product_id": "kernel-headers-0:2.6.18-53.1.13.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-xen-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-debug-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-devel-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-headers-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.13.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-debug-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-devel-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-headers-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.src" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-53.1.13.el5.noarch", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.src" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-53.1.13.el5.noarch", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-0600", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2008-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "432251" } ], "notes": [ { "category": "description", "text": "The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel vmsplice_to_pipe flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-0:2.6.18-53.1.13.el5.src", "5Client:kernel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-0:2.6.18-53.1.13.el5.src", "5Server:kernel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0600" }, { "category": "external", "summary": "RHBZ#432251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432251" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0600", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0600" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0600", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0600" } ], "release_date": "2008-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-12T16:53:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-0:2.6.18-53.1.13.el5.src", "5Client:kernel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-0:2.6.18-53.1.13.el5.src", "5Server:kernel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2008:0129" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-0:2.6.18-53.1.13.el5.src", "5Client:kernel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-0:2.6.18-53.1.13.el5.src", "5Server:kernel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel vmsplice_to_pipe flaw" } ] }
RHSA-2008:0129
Vulnerability from csaf_redhat
Published
2008-02-12 16:53
Modified
2024-11-22 01:48
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix a security issue are now available for Red
Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
A flaw was found in vmsplice. An unprivileged local user could use this
flaw to gain root privileges. (CVE-2008-0600)
Red Hat is aware that a public exploit for this issue is available. This
issue did not affect the Linux kernels distributed with Red Hat Enterprise
Linux 2.1, 3, or 4.
Red Hat Enterprise Linux 5 users are advised to upgrade to these updated
packages, which contain a backported patch to resolve this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix a security issue are now available for Red\nHat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nA flaw was found in vmsplice. An unprivileged local user could use this\nflaw to gain root privileges. (CVE-2008-0600)\n\nRed Hat is aware that a public exploit for this issue is available. This\nissue did not affect the Linux kernels distributed with Red Hat Enterprise\nLinux 2.1, 3, or 4.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these updated\npackages, which contain a backported patch to resolve this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0129", "url": "https://access.redhat.com/errata/RHSA-2008:0129" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "432251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432251" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0129.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-22T01:48:15+00:00", "generator": { "date": "2024-11-22T01:48:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0129", "initial_release_date": "2008-02-12T16:53:00+00:00", "revision_history": [ { "date": "2008-02-12T16:53:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-02-12T11:54:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:48:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-xen-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-debug-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-devel-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-PAE-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-53.1.13.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.13.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.13.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.i386", "product_id": "kernel-headers-0:2.6.18-53.1.13.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch", "product_id": "kernel-doc-0:2.6.18-53.1.13.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-53.1.13.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.13.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-53.1.13.el5.src", "product": { "name": "kernel-0:2.6.18-53.1.13.el5.src", "product_id": "kernel-0:2.6.18-53.1.13.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc", "product_id": "kernel-headers-0:2.6.18-53.1.13.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-xen-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-debug-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-devel-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-headers-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.13.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-debug-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-devel-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x", "product_id": "kernel-headers-0:2.6.18-53.1.13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.src" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-53.1.13.el5.noarch", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.src" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-53.1.13.el5.noarch", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-0600", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2008-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "432251" } ], "notes": [ { "category": "description", "text": "The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel vmsplice_to_pipe flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-0:2.6.18-53.1.13.el5.src", "5Client:kernel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-0:2.6.18-53.1.13.el5.src", "5Server:kernel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0600" }, { "category": "external", "summary": "RHBZ#432251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432251" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0600", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0600" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0600", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0600" } ], "release_date": "2008-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-12T16:53:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-0:2.6.18-53.1.13.el5.src", "5Client:kernel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-0:2.6.18-53.1.13.el5.src", "5Server:kernel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2008:0129" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-0:2.6.18-53.1.13.el5.src", "5Client:kernel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-0:2.6.18-53.1.13.el5.src", "5Server:kernel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel vmsplice_to_pipe flaw" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.