Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2010-1641
Vulnerability from cvelistv5
Published
2010-06-01 20:00
Modified
2024-08-07 01:28
Severity ?
EPSS score ?
Summary
The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:28:42.119Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SA:2010:031", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html" }, { "name": "SUSE-SA:2010:033", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00000.html" }, { "name": "[oss-security] 20100525 CVE request - kernel: GFS2: The setflags ioctl() doesn\u0027t check file ownership", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/05/25/1" }, { "name": "kernel-gfs2-security-bypass(58926)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58926" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7df0e0397b9a18358573274db9fdab991941062f" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/incr/patch-2.6.34-git9-git10.bz2" }, { "name": "40645", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40645" }, { "name": "43315", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43315" }, { "name": "[cluster-devel] 20100525 [PATCH 3/3] GFS2: Fix permissions checking for setflags ioctl()", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://www.redhat.com/archives/cluster-devel/2010-May/msg00049.html" }, { "name": "oval:org.mitre.oval:def:9916", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9916" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" }, { "name": "[oss-security] 20100525 Re: CVE request - kernel: GFS2: The setflags ioctl() doesn\u0027t check file ownership", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/05/25/12" }, { "name": "[oss-security] 20100526 Re: CVE request - kernel: GFS2: The setflags ioctl() doesn\u0027t check file ownership", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/05/26/1" }, { "name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { "name": "40356", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40356" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595579" }, { "name": "ADV-2010-1857", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1857" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "SUSE-SA:2010:031", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html" }, { "name": "SUSE-SA:2010:033", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00000.html" }, { "name": "[oss-security] 20100525 CVE request - kernel: GFS2: The setflags ioctl() doesn\u0027t check file ownership", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/05/25/1" }, { "name": "kernel-gfs2-security-bypass(58926)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58926" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7df0e0397b9a18358573274db9fdab991941062f" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/incr/patch-2.6.34-git9-git10.bz2" }, { "name": "40645", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40645" }, { "name": "43315", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43315" }, { "name": "[cluster-devel] 20100525 [PATCH 3/3] GFS2: Fix permissions checking for setflags ioctl()", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://www.redhat.com/archives/cluster-devel/2010-May/msg00049.html" }, { "name": "oval:org.mitre.oval:def:9916", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9916" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" }, { "name": "[oss-security] 20100525 Re: CVE request - kernel: GFS2: The setflags ioctl() doesn\u0027t check file ownership", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/05/25/12" }, { "name": "[oss-security] 20100526 Re: CVE request - kernel: GFS2: The setflags ioctl() doesn\u0027t check file ownership", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/05/26/1" }, { "name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { "name": "40356", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40356" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595579" }, { "name": "ADV-2010-1857", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1857" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-1641", "datePublished": "2010-06-01T20:00:00", "dateReserved": "2010-04-29T00:00:00", "dateUpdated": "2024-08-07T01:28:42.119Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2010-1641\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2010-06-01T20:30:02.867\",\"lastModified\":\"2024-11-21T01:14:52.083\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n \\\"do_gfs2_set_flags\\\" en \\\"fs/gfs2/file.c\\\" del kernel de Linux anterior a v2.6.34-git10 no comprueba el propietario del archivo, lo que permite a usuarios locales evitar restricciones de acceso intencionadas a trav\u00e9s de peticiones SETFLAGS ioctl.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:git9:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.34\",\"matchCriteriaId\":\"0463EA64-7A13-4959-8D9D-57574C321F21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142BCD48-8387-4D0C-A052-44DD4144CBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8220D81-9065-471F-9256-CFE7B9941555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB445E3E-CCBD-4737-BE30-841B9A79D558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5301E27-8021-467C-A9A2-AF2137EF0299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79787868-2D77-4B55-AD61-C2B357CCE047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B3F27D3-8F1D-4576-A584-1E2059CC67B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5D260C-AE1C-47E9-A88C-B9C2B4349249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9958C6-AB7D-4B67-9AA7-42B628CBC391\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16E3D04-EC66-41FD-9CFA-FE0C21952CAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"455E647F-73DD-400A-AA19-3D93FE2E57AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B812DFE2-6FFA-4D31-839C-0CCB2B1310EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D90502F-EC45-4ADC-9428-B94346DA660B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CD39A7A-9172-4B85-B8FE-CEB94207A897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81DE32C2-5B07-4812-9F88-000F5FB000C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02EED3D5-8F89-4B7F-A34B-52274B1A754F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F87AA89-F377-4BEB-B69F-809F5DA6176C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C27AF62E-A026-43E9-89E6-CD807CE9DF51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D343B121-C007-49F8-9DE8-AA05CE58FF0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7936B7EE-9CD1-4698-AD67-C619D0171A88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5738D628-0B2D-4F56-9427-2009BFCB6C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F43EBCB4-FCF4-479A-A44D-D913F7F09C77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860F9225-8A3F-492C-B72B-5EFFB322802C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E23724-2CA4-4211-BB83-38661BE7E6AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6143DC1F-D62E-4DB2-AF43-30A07413D68B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"298266AB-2A36-4606-BF80-2185FC56C4D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C2658CA-56C2-494F-AC42-618EC413CBDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD34526D-F2CC-44C5-991D-B1E41C327860\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F0B900-34E9-4545-B7AE-AF0A4363EACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B36F432D-FED1-4B8D-A458-BEDEEF306AB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25379B32-D898-4E44-A740-978A129B5E05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"915E64EF-6EEC-4DE2-A285-5F3FCE389645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585BEE46-088A-494E-8E18-03F33F6BBEA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFF35478-B292-4A00-B985-CEEDE8B212C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E85846A-61BE-4896-B4A6-42A7E1DBA515\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6E3B925-031D-4F6D-915A-A16F0FFA878C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7344B707-6145-48BA-8BC9-9B140A260BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BFCEA98-C708-4E1E-B189-E6F96D28F07A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B753112-CCDE-4870-AA97-4AAA2946421A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79B3AFE7-F4FF-4144-9046-E5926E305A03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7616E197-ACCA-4191-A513-FD48417C7F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE2F94D-E8E0-4BB7-A910-378012580025\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F5AE3B-B701-4579-B44A-0F7A4267852E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34E60197-56C3-485C-9609-B1C4A0E0FCB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E452E4-45A9-4469-BF69-F40B6598F0EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5751AC4-A60F-42C6-88E5-FC8CFEE6F696\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48777A01-8F36-4752-8F7A-1D1686C69A33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42DA6A18-5AA1-4920-94C6-8D0BB73C5352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51F0211-2D3E-4260-AD63-E83AE4EC4AF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C4E1245-C6BB-462C-9E27-C608595DAE3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"747F1324-AEFA-496F-9447-12CD13114F60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"795C3B17-687E-4F33-AA99-8FEC16F14693\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B81A4DD-2ADE-4455-B517-5E4E0532D5A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BD589CC-666B-4FAA-BCF0-91C484BDDB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD622EE-A840-42E1-B6BF-4AA27D039B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"900D6742-DE0F-45C5-A812-BF84088CB02A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225CA94C-8C84-4FA6-95D0-160A0016FBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D88ED3C4-64C5-44B2-9F23-E16087046C40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03FB31E5-190C-489A-AB30-910D2CC854F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF4A781A-4A41-466F-8426-10B40CF8BA1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ED29B3F-456B-4767-8E59-8C19A3B7E1D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6316369-B54A-4E59-A022-E0610353B284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"073C3CE0-E12D-4545-8460-5A1514271D50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB33DEA-13C7-4B36-AB8A-ED680679A071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86DD0FCC-BB12-410D-8C82-AB99C7C5311E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83700989-8820-48DA-A9FE-6A77DF1E8439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC9F4CEC-7781-468B-B460-4F487B7C6601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67C75A62-8807-4821-9362-1E0D63C0A1B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"894D4812-D62F-489E-8D0E-5E9468CE8EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F92E01-4F08-4364-9E87-FFBC095E32E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E86E13B-EC92-47F3-94A9-DB515313011D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C6C01B-4CED-4F37-A415-0603496C27DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC47887B-5608-47BE-85EE-563864461915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF39E62B-EAB4-44B0-A421-2A71B7DD8341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"809264F1-763D-4A8F-B206-222332DD8732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A66ED53E-3139-4972-B027-D614BFFB8628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A3AB7A-1959-4A57-B83D-B2753C43649E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A60B265-5508-4EE0-980A-44BB0966FD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"338BB401-8831-4094-9186-2B3CFA5903D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F6269B-5F6B-4413-B14D-7AE5442E4CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189D1246-F975-4411-A58B-343ED90485FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B914F7F-C6BD-4527-B1E9-7FD1E337A18C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615BDD1D-36AA-4976-909B-F0F66BF1090C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61A3EDF2-09D7-4116-AE46-D86E4B9602AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F320FA9F-C13D-4AA3-B838-A0E5D63E6A29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B179CF1D-084D-4B21-956F-E55AC6BDE026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F1B4877-286A-44B5-9C5C-0403F75B2BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"432CA976-6EFA-4D34-B5EA-CD772D067F93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E476195-657E-416E-BC16-44A18B06A133\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E249774-CE05-43D5-A5A3-7CCE24BB2AD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D42BA44-C69B-4170-9867-CABF93CA9BD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5140380C-71BD-464F-AE53-1814C2653056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B18EC0A7-8616-4039-B98B-E1216E035B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22FB141B-FA2A-435D-8937-83FC0669CB20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C59131C8-F66A-4380-9F6E-3FC14C7C8562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5421616-4BF5-4269-8996-C3D2BA6AE2A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23FC6CE2-8717-4558-A309-A441D322F00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"311BE336-7BB2-47C0-AED5-3DEA706C206F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"085259B8-9D41-42B0-B32B-66B8D365F106\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A12DE15-E192-4B90-ADB7-A886B3746DD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF6588E7-F4FA-40F5-8945-FC7B6094376E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE87E13E-ACF7-4F74-8938-729F3B0D694C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4965A12-1BBA-4494-A5C1-43E0C0F48C14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46568A0D-F374-4DAB-9B64-FCC74A9AA07B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"084A2575-E5A6-43BD-8CE5-1EF628AA9ACB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"041CE8AF-711C-496D-BDF2-B4AB655C0C8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE192302-F569-4301-83F2-AEE020FB77B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2597A691-01B8-4FD2-AF71-D4BCC15C6F10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D81C2911-5781-46A4-AD27-F946BD44EAEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DB53511-E1B0-4F81-BE9E-B52E84E9C30E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"207306A0-19F5-4E49-945C-A5E4DD442459\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DE43C00-5967-44A1-ACEB-B7AF66EEBB53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B33B5E4B-FCB3-4343-B992-F0ADB853754B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7295BBE-A9E3-44F6-9DD6-0FD6C2591E11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"B220EA3F-55B3-4B6E-8285-B28ADEF50138\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17721A7D-E955-407B-AACB-97F859CE79C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B04F515-29A7-4D6A-AFC5-3A115F8A5918\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:git1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BCC1F6F-4990-4630-A928-A23B4E0E54F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:git2:*:*:*:*:*:*\",\"matchCriteriaId\":\"20DAAAFB-EEF1-451D-A68D-4E89EE73C68F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:git3:*:*:*:*:*:*\",\"matchCriteriaId\":\"403EB42D-4EB4-4C1B-81B5-0D731C148AB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:git4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B180DEFA-52CF-4A2A-9B78-D96CDE941238\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:git5:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4EE294A-69D7-4486-A463-5AF5E64E3696\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:git6:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B8411F4-EFD9-4ECB-A263-A64192B24E2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:git7:*:*:*:*:*:*\",\"matchCriteriaId\":\"28250034-A8C6-480F-9A70-E2C0F7C55600\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:git8:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC89871F-2F08-45B3-A25F-F2EA0ADE9AD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2033D2AE-EB00-4696-B72F-8739021D1788\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"86D3F64C-3F27-43E0-B0D4-62CE1E1F4EFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"7927713B-5EB0-41EB-86A9-9935775162E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"59037296-3143-4FBB-AFF7-D4FE2C85502F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CA27FD5-7DBF-4C85-80A9-D523B2E4B033\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"9711E333-A8E7-4F4B-BCFD-2023E889651A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"E04D3358-973B-42A1-8E08-2E3AE947193C\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7df0e0397b9a18358573274db9fdab991941062f\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00000.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/40645\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/43315\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/incr/patch-2.6.34-git9-git10.bz2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/05/25/1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/05/25/12\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/05/26/1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/516397/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/40356\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0003.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/1857\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=595579\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/58926\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9916\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/cluster-devel/2010-May/msg00049.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7df0e0397b9a18358573274db9fdab991941062f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/40645\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43315\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/incr/patch-2.6.34-git9-git10.bz2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/05/25/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/05/25/12\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/05/26/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/516397/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/40356\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/1857\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=595579\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/58926\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9916\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/cluster-devel/2010-May/msg00049.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ghsa-3gqr-4hx6-58xj
Vulnerability from github
Published
2022-05-14 02:45
Modified
2022-05-14 02:45
Details
The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.
{ "affected": [], "aliases": [ "CVE-2010-1641" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-06-01T20:30:00Z", "severity": "MODERATE" }, "details": "The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.", "id": "GHSA-3gqr-4hx6-58xj", "modified": "2022-05-14T02:45:01Z", "published": "2022-05-14T02:45:01Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1641" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595579" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58926" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9916" }, { "type": "WEB", "url": "https://www.redhat.com/archives/cluster-devel/2010-May/msg00049.html" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7df0e0397b9a18358573274db9fdab991941062f" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7df0e0397b9a18358573274db9fdab991941062f" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00000.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/40645" }, { "type": "WEB", "url": "http://secunia.com/advisories/43315" }, { "type": "WEB", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/incr/patch-2.6.34-git9-git10.bz2" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2010/05/25/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2010/05/25/12" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2010/05/26/1" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/40356" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/1857" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2010_0504
Vulnerability from csaf_redhat
Published
2010-07-01 18:00
Modified
2024-11-22 03:30
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issues:
* multiple flaws were found in the mmap and mremap implementations. A local
user could use these flaws to cause a local denial of service or escalate
their privileges. (CVE-2010-0291, Important)
* a NULL pointer dereference flaw was found in the Fast Userspace Mutexes
(futexes) implementation. The unlock code path did not check if the futex
value associated with pi_state->owner had been modified. A local user could
use this flaw to modify the futex value, possibly leading to a denial of
service or privilege escalation when the pi_state->owner pointer is
dereferenced. (CVE-2010-0622, Important)
* a NULL pointer dereference flaw was found in the Linux kernel Network
File System (NFS) implementation. A local user on a system that has an
NFS-mounted file system could use this flaw to cause a denial of service or
escalate their privileges on that system. (CVE-2010-1087, Important)
* a flaw was found in the sctp_process_unk_param() function in the Linux
kernel Stream Control Transmission Protocol (SCTP) implementation. A remote
attacker could send a specially-crafted SCTP packet to an SCTP listening
port on a target system, causing a kernel panic (denial of service).
(CVE-2010-1173, Important)
* a flaw was found in the Linux kernel Transparent Inter-Process
Communication protocol (TIPC) implementation. If a client application, on a
local system where the tipc module is not yet in network mode, attempted to
send a message to a remote TIPC node, it would dereference a NULL pointer
on the local system, causing a kernel panic (denial of service).
(CVE-2010-1187, Important)
* a buffer overflow flaw was found in the Linux kernel Global File System 2
(GFS2) implementation. In certain cases, a quota could be written past the
end of a memory page, causing memory corruption, leaving the quota stored
on disk in an invalid state. A user with write access to a GFS2 file system
could trigger this flaw to cause a kernel crash (denial of service) or
escalate their privileges on the GFS2 server. This issue can only be
triggered if the GFS2 file system is mounted with the "quota=on" or
"quota=account" mount option. (CVE-2010-1436, Important)
* a race condition between finding a keyring by name and destroying a freed
keyring was found in the Linux kernel key management facility. A local user
could use this flaw to cause a kernel panic (denial of service) or escalate
their privileges. (CVE-2010-1437, Important)
* a flaw was found in the link_path_walk() function in the Linux kernel.
Using the file descriptor returned by the open() function with the
O_NOFOLLOW flag on a subordinate NFS-mounted file system, could result in a
NULL pointer dereference, causing a denial of service or privilege
escalation. (CVE-2010-1088, Moderate)
* a missing permission check was found in the gfs2_set_flags() function in
the Linux kernel GFS2 implementation. A local user could use this flaw to
change certain file attributes of files, on a GFS2 file system, that they
do not own. (CVE-2010-1641, Low)
Red Hat would like to thank Jukka Taimisto and Olli Jarva of Codenomicon
Ltd, Nokia Siemens Networks, and Wind River on behalf of their customer,
for responsibly reporting CVE-2010-1173; Mario Mikocevic for responsibly
reporting CVE-2010-1436; and Dan Rosenberg for responsibly reporting
CVE-2010-1641.
This update also fixes several bugs. Documentation for these bug fixes will
be available shortly from
http://www.redhat.com/docs/en-US/errata/RHSA-2010-0504/Kernel_Security_Update/index.html
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* multiple flaws were found in the mmap and mremap implementations. A local\nuser could use these flaws to cause a local denial of service or escalate\ntheir privileges. (CVE-2010-0291, Important)\n\n* a NULL pointer dereference flaw was found in the Fast Userspace Mutexes\n(futexes) implementation. The unlock code path did not check if the futex\nvalue associated with pi_state-\u003eowner had been modified. A local user could\nuse this flaw to modify the futex value, possibly leading to a denial of\nservice or privilege escalation when the pi_state-\u003eowner pointer is\ndereferenced. (CVE-2010-0622, Important)\n\n* a NULL pointer dereference flaw was found in the Linux kernel Network\nFile System (NFS) implementation. A local user on a system that has an\nNFS-mounted file system could use this flaw to cause a denial of service or\nescalate their privileges on that system. (CVE-2010-1087, Important)\n\n* a flaw was found in the sctp_process_unk_param() function in the Linux\nkernel Stream Control Transmission Protocol (SCTP) implementation. A remote\nattacker could send a specially-crafted SCTP packet to an SCTP listening\nport on a target system, causing a kernel panic (denial of service).\n(CVE-2010-1173, Important)\n\n* a flaw was found in the Linux kernel Transparent Inter-Process\nCommunication protocol (TIPC) implementation. If a client application, on a\nlocal system where the tipc module is not yet in network mode, attempted to\nsend a message to a remote TIPC node, it would dereference a NULL pointer\non the local system, causing a kernel panic (denial of service).\n(CVE-2010-1187, Important)\n\n* a buffer overflow flaw was found in the Linux kernel Global File System 2\n(GFS2) implementation. In certain cases, a quota could be written past the\nend of a memory page, causing memory corruption, leaving the quota stored\non disk in an invalid state. A user with write access to a GFS2 file system\ncould trigger this flaw to cause a kernel crash (denial of service) or\nescalate their privileges on the GFS2 server. This issue can only be\ntriggered if the GFS2 file system is mounted with the \"quota=on\" or\n\"quota=account\" mount option. (CVE-2010-1436, Important)\n\n* a race condition between finding a keyring by name and destroying a freed\nkeyring was found in the Linux kernel key management facility. A local user\ncould use this flaw to cause a kernel panic (denial of service) or escalate\ntheir privileges. (CVE-2010-1437, Important)\n\n* a flaw was found in the link_path_walk() function in the Linux kernel.\nUsing the file descriptor returned by the open() function with the\nO_NOFOLLOW flag on a subordinate NFS-mounted file system, could result in a\nNULL pointer dereference, causing a denial of service or privilege\nescalation. (CVE-2010-1088, Moderate)\n\n* a missing permission check was found in the gfs2_set_flags() function in\nthe Linux kernel GFS2 implementation. A local user could use this flaw to\nchange certain file attributes of files, on a GFS2 file system, that they\ndo not own. (CVE-2010-1641, Low)\n\nRed Hat would like to thank Jukka Taimisto and Olli Jarva of Codenomicon\nLtd, Nokia Siemens Networks, and Wind River on behalf of their customer,\nfor responsibly reporting CVE-2010-1173; Mario Mikocevic for responsibly\nreporting CVE-2010-1436; and Dan Rosenberg for responsibly reporting\nCVE-2010-1641.\n\nThis update also fixes several bugs. Documentation for these bug fixes will\nbe available shortly from\nhttp://www.redhat.com/docs/en-US/errata/RHSA-2010-0504/Kernel_Security_Update/index.html\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0504", "url": "https://access.redhat.com/errata/RHSA-2010:0504" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://kbase.redhat.com/faq/docs/DOC-31052", "url": "http://kbase.redhat.com/faq/docs/DOC-31052" }, { "category": "external", "summary": "http://www.redhat.com/docs/en-US/errata/RHSA-2010-0504/Kernel_Security_Update/index.html", "url": "http://www.redhat.com/docs/en-US/errata/RHSA-2010-0504/Kernel_Security_Update/index.html" }, { "category": "external", "summary": "556703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=556703" }, { "category": "external", "summary": "563091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=563091" }, { "category": "external", "summary": "567184", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567184" }, { "category": "external", "summary": "567813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567813" }, { "category": "external", "summary": "578057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=578057" }, { "category": "external", "summary": "584645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=584645" }, { "category": "external", "summary": "585094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=585094" }, { "category": "external", "summary": "586006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=586006" }, { "category": "external", "summary": "587957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=587957" }, { "category": "external", "summary": "588219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=588219" }, { "category": "external", "summary": "591493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=591493" }, { "category": "external", "summary": "591611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=591611" }, { "category": "external", "summary": "592844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=592844" }, { "category": "external", "summary": "592846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=592846" }, { "category": "external", "summary": "594054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=594054" }, { "category": "external", "summary": "594057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=594057" }, { "category": "external", "summary": "594061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=594061" }, { "category": "external", "summary": "595579", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595579" }, { "category": "external", "summary": "596384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=596384" }, { "category": "external", "summary": "596385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=596385" }, { "category": "external", "summary": "598355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=598355" }, { "category": "external", "summary": "599332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=599332" }, { "category": "external", "summary": "599730", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=599730" }, { "category": "external", "summary": "599734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=599734" }, { "category": "external", "summary": "599737", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=599737" }, { "category": "external", "summary": "599739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=599739" }, { "category": "external", "summary": "600215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=600215" }, { "category": "external", "summary": "600498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=600498" }, { "category": "external", "summary": "601080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=601080" }, { "category": "external", "summary": "601090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=601090" }, { "category": "external", "summary": "607087", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=607087" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0504.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T03:30:48+00:00", "generator": { "date": "2024-11-22T03:30:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0504", "initial_release_date": "2010-07-01T18:00:00+00:00", "revision_history": [ { "date": "2010-07-01T18:00:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-07-01T14:26:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:30:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-devel-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-xen-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-PAE-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-debug-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-194.8.1.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.8.1.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.i386", "product_id": "kernel-headers-0:2.6.18-194.8.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.8.1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.8.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.8.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.8.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.8.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-194.8.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.8.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-194.8.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.8.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.8.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.8.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-194.8.1.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-194.8.1.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-194.8.1.el5.noarch", "product_id": "kernel-doc-0:2.6.18-194.8.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-194.8.1.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-194.8.1.el5.src", "product": { "name": "kernel-0:2.6.18-194.8.1.el5.src", "product_id": "kernel-0:2.6.18-194.8.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.8.1.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-194.8.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.8.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.8.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.8.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.8.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.8.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-194.8.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.8.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.8.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.8.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-194.8.1.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.8.1.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.ppc", "product_id": "kernel-headers-0:2.6.18-194.8.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.8.1.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-194.8.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.8.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-devel-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.8.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-headers-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.8.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.8.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.8.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-194.8.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.8.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-debug-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.8.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.8.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-194.8.1.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.8.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-devel-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.8.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-headers-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.8.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.8.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-xen-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-194.8.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.8.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-194.8.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.8.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-debug-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.8.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.8.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-194.8.1.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.8.1.el5.src" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-194.8.1.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-194.8.1.el5.noarch", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.8.1.el5.src" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-194.8.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-194.8.1.el5.noarch", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-0291", "discovery_date": "2010-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "556703" } ], "notes": [ { "category": "description", "text": "The Linux kernel before 2.6.32.4 allows local users to gain privileges or cause a denial of service (panic) by calling the (1) mmap or (2) mremap function, aka the \"do_mremap() mess\" or \"mremap/mmap mess.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: untangle the do_mremap()", "title": "Vulnerability summary" }, { "category": "other", "text": "The risks associated with fixing this bug are greater than the important severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 3 and 4. This issue was addressed in Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2010-0504.html and https://rhn.redhat.com/errata/RHSA-2010-0161.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0291" }, { "category": "external", "summary": "RHBZ#556703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=556703" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0291", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0291" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0291", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0291" } ], "release_date": "2009-12-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-07-01T18:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0504" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: untangle the do_mremap()" }, { "cve": "CVE-2010-0622", "discovery_date": "2010-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "563091" } ], "notes": [ { "category": "description", "text": "The wake_futex_pi function in kernel/futex.c in the Linux kernel before 2.6.33-rc7 does not properly handle certain unlock operations for a Priority Inheritance (PI) futex, which allows local users to cause a denial of service (OOPS) and possibly have unspecified other impact via vectors involving modification of the futex value from user space.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: futex: Handle user space corruption gracefully", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3 and 4, as they do not include support for priority-inheriting futex. Future updates in Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0622" }, { "category": "external", "summary": "RHBZ#563091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=563091" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0622", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0622" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0622", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0622" } ], "release_date": "2010-02-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-07-01T18:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0504" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: futex: Handle user space corruption gracefully" }, { "cve": "CVE-2010-1087", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "567184" } ], "notes": [ { "category": "description", "text": "The nfs_wait_on_request function in fs/nfs/pagelist.c in Linux kernel 2.6.x through 2.6.33-rc5 allows attackers to cause a denial of service (Oops) via unknown vectors related to truncating a file and an operation that is not interruptible.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NFS: Fix an Oops when truncating a file", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3 and 4 as they did not include the upstream commit 150030b7 that had introduced the problem. A future update in Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1087" }, { "category": "external", "summary": "RHBZ#567184", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567184" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1087", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1087" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1087", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1087" } ], "release_date": "2010-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-07-01T18:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0504" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: NFS: Fix an Oops when truncating a file" }, { "cve": "CVE-2010-1088", "discovery_date": "2010-02-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "567813" } ], "notes": [ { "category": "description", "text": "fs/namei.c in Linux kernel 2.6.18 through 2.6.34 does not always follow NFS automount \"symlinks,\" which allows attackers to have an unknown impact, related to LOOKUP_FOLLOW.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fix LOOKUP_FOLLOW on automount \"symlinks\"", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3 and 4 as this issue only affects kernel version 2.6.18 and onwards. A future update in Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1088" }, { "category": "external", "summary": "RHBZ#567813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1088", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1088" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1088", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1088" } ], "release_date": "2010-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-07-01T18:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0504" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: fix LOOKUP_FOLLOW on automount \"symlinks\"" }, { "acknowledgments": [ { "names": [ "Wind River", "Nokia Siemens Networks" ] }, { "names": [ "Olli Jarva", "Jukka Taimisto" ], "organization": "Codenomicon Ltd" } ], "cve": "CVE-2010-1173", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "584645" } ], "notes": [ { "category": "description", "text": "The sctp_process_unk_param function in net/sctp/sm_make_chunk.c in the Linux kernel 2.6.33.3 and earlier, when SCTP is enabled, allows remote attackers to cause a denial of service (system crash) via an SCTPChunkInit packet containing multiple invalid parameters that require a large amount of error data.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sctp: crash due to malformed SCTPChunkInit packet", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/CVE-2010-1173.\n\nThis issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3 as it did not include support for SCTP. Future kernel updates in Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG may address this flaw.\n\nFor more information, please see http://kbase.redhat.com/faq/docs/DOC-31052.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1173" }, { "category": "external", "summary": "RHBZ#584645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=584645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1173", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1173" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1173", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1173" } ], "release_date": "2010-04-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-07-01T18:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0504" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: sctp: crash due to malformed SCTPChunkInit packet" }, { "cve": "CVE-2010-1187", "discovery_date": "2010-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "578057" } ], "notes": [ { "category": "description", "text": "The Transparent Inter-Process Communication (TIPC) functionality in Linux kernel 2.6.16-rc1 through 2.6.33, and possibly other versions, allows local users to cause a denial of service (kernel OOPS) by sending datagrams through AF_TIPC before entering network mode, which triggers a NULL pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: tipc: Fix oops on send prior to entering networked mode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/CVE-2010-1187.\n\nThis issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 3, 4 and Red Hat Enterprise MRG as they did not include support for Transparent Inter-Process Communication Protocol (TIPC). A future kernel update in Red Hat Enterprise Linux 5 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1187" }, { "category": "external", "summary": "RHBZ#578057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=578057" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1187", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1187" } ], "release_date": "2010-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-07-01T18:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0504" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: tipc: Fix oops on send prior to entering networked mode" }, { "acknowledgments": [ { "names": [ "Mario Mikocevic" ] } ], "cve": "CVE-2010-1436", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "586006" } ], "notes": [ { "category": "description", "text": "gfs2 in the Linux kernel 2.6.18, and possibly other versions, does not properly handle when the gfs2_quota struct occupies two separate pages, which allows local users to cause a denial of service (kernel panic) via certain manipulations that cause an out-of-bounds write, as demonstrated by writing from an ext3 file system to a gfs2 file system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: gfs2 buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG as they did not include support for the GFS2 file system.\n\nA future kernel update in Red Hat Enterprise Linux 5 will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1436" }, { "category": "external", "summary": "RHBZ#586006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=586006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1436", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1436" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1436", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1436" } ], "release_date": "2010-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-07-01T18:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0504" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: gfs2 buffer overflow" }, { "cve": "CVE-2010-1437", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "585094" } ], "notes": [ { "category": "description", "text": "Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: keyrings: find_keyring_by_name() can gain the freed keyring", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 3. Future kernel updates in Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1437" }, { "category": "external", "summary": "RHBZ#585094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=585094" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1437", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1437" } ], "release_date": "2010-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-07-01T18:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0504" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: keyrings: find_keyring_by_name() can gain the freed keyring" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-1641", "discovery_date": "2010-05-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "595579" } ], "notes": [ { "category": "description", "text": "The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: GFS2: The setflags ioctl() doesn\u0027t check file ownership", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/CVE-2010-1641.\n\nThis issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 3, 4 and Red Hat Enterprise MRG as they did not include\nsupport for the GFS2 file system.\n\nA future kernel update in Red Hat Enterprise Linux 5 will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1641" }, { "category": "external", "summary": "RHBZ#595579", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595579" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1641", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1641" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1641", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1641" } ], "release_date": "2010-05-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-07-01T18:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0504" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: GFS2: The setflags ioctl() doesn\u0027t check file ownership" } ] }
gsd-2010-1641
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2010-1641", "description": "The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.", "id": "GSD-2010-1641", "references": [ "https://www.suse.com/security/cve/CVE-2010-1641.html", "https://access.redhat.com/errata/RHSA-2010:0504", "https://linux.oracle.com/cve/CVE-2010-1641.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2010-1641" ], "details": "The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.", "id": "GSD-2010-1641", "modified": "2023-12-13T01:21:32.641385Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-1641", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://secunia.com/advisories/43315", "refsource": "MISC", "url": "http://secunia.com/advisories/43315" }, { "name": "http://www.securityfocus.com/archive/1/516397/100/0/threaded", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html", "refsource": "MISC", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html" }, { "name": "http://secunia.com/advisories/40645", "refsource": "MISC", "url": "http://secunia.com/advisories/40645" }, { "name": "http://www.vupen.com/english/advisories/2010/1857", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2010/1857" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00000.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00000.html" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7df0e0397b9a18358573274db9fdab991941062f", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7df0e0397b9a18358573274db9fdab991941062f" }, { "name": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/incr/patch-2.6.34-git9-git10.bz2", "refsource": "MISC", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/incr/patch-2.6.34-git9-git10.bz2" }, { "name": "http://www.openwall.com/lists/oss-security/2010/05/25/1", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2010/05/25/1" }, { "name": "http://www.openwall.com/lists/oss-security/2010/05/25/12", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2010/05/25/12" }, { "name": "http://www.openwall.com/lists/oss-security/2010/05/26/1", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2010/05/26/1" }, { "name": "http://www.securityfocus.com/bid/40356", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/40356" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58926", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58926" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9916", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9916" }, { "name": "https://www.redhat.com/archives/cluster-devel/2010-May/msg00049.html", "refsource": "MISC", "url": "https://www.redhat.com/archives/cluster-devel/2010-May/msg00049.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=595579", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595579" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:git6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:git7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:git3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:git2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:git5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:git8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:git9:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.6.34", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:git1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:git4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-1641" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=595579", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595579" }, { "name": "[oss-security] 20100525 CVE request - kernel: GFS2: The setflags ioctl() doesn\u0027t check file ownership", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2010/05/25/1" }, { "name": "[cluster-devel] 20100525 [PATCH 3/3] GFS2: Fix permissions checking for setflags ioctl()", "refsource": "MLIST", "tags": [], "url": "https://www.redhat.com/archives/cluster-devel/2010-May/msg00049.html" }, { "name": "40356", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/40356" }, { "name": "[oss-security] 20100525 Re: CVE request - kernel: GFS2: The setflags ioctl() doesn\u0027t check file ownership", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2010/05/25/12" }, { "name": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/incr/patch-2.6.34-git9-git10.bz2", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/incr/patch-2.6.34-git9-git10.bz2" }, { "name": "[oss-security] 20100526 Re: CVE request - kernel: GFS2: The setflags ioctl() doesn\u0027t check file ownership", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2010/05/26/1" }, { "name": "SUSE-SA:2010:031", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html" }, { "name": "40645", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/40645" }, { "name": "ADV-2010-1857", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2010/1857" }, { "name": "SUSE-SA:2010:033", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00000.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" }, { "name": "43315", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/43315" }, { "name": "kernel-gfs2-security-bypass(58926)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58926" }, { "name": "oval:org.mitre.oval:def:9916", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9916" }, { "name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7df0e0397b9a18358573274db9fdab991941062f", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7df0e0397b9a18358573274db9fdab991941062f" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T04:19Z", "publishedDate": "2010-06-01T20:30Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.